General

  • Target

    2342.exe

  • Size

    907KB

  • Sample

    250131-z66e2axlfx

  • MD5

    840aae69e0ade8737af46709b0e70a12

  • SHA1

    7cd1b72849c21e22e00677350565eee5fd004cb9

  • SHA256

    7a6299c1f92c23741b546f6445655d2b28d5ec591719d7c55f942316c867f21c

  • SHA512

    873798481adbeddb4011b43e1dfda20f73d4cc30cda5c964504f60fc42c71aa486b10da9330f4d90c2c457b758e0c14e8274a1b3c920ed166b60a9b523f51092

  • SSDEEP

    12288:foHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAYrZNrI0AilFEvxH:Deu4MROxnFDgHLrZlI0AilFEvxHidE

Malware Config

Extracted

Family

orcus

C2

147.185.221.24:35724

Mutex

5e7767f2db524439a050fdf054bd5f58

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      2342.exe

    • Size

      907KB

    • MD5

      840aae69e0ade8737af46709b0e70a12

    • SHA1

      7cd1b72849c21e22e00677350565eee5fd004cb9

    • SHA256

      7a6299c1f92c23741b546f6445655d2b28d5ec591719d7c55f942316c867f21c

    • SHA512

      873798481adbeddb4011b43e1dfda20f73d4cc30cda5c964504f60fc42c71aa486b10da9330f4d90c2c457b758e0c14e8274a1b3c920ed166b60a9b523f51092

    • SSDEEP

      12288:foHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAYrZNrI0AilFEvxH:Deu4MROxnFDgHLrZlI0AilFEvxHidE

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks