General

  • Target

    GuardianQA.xlsm

  • Size

    3.7MB

  • Sample

    250201-b6n9rasrdn

  • MD5

    f9379219193a6ad229cb99ea103240cc

  • SHA1

    d7776b47f7d16e66d52ff3d2cda8af982f713ea4

  • SHA256

    8258c96fcb836d6b29aa90529835ed1ee4fe6143bb5221459fe5e4a81b18d2e6

  • SHA512

    c8fcb2db9ecdc4aa7aefd42fc003f8bd8c2a60d1ee59a4a6d573c422812b861487b0c79fd99de4e773afa60ddd4b36a5ee447089a382ddfdfce4ffa82e661a76

  • SSDEEP

    98304:JjD7OuWRWu3nj7fH2a6AuxvczmQjj+xwT+aNaHmt:JjOuaWu3H2a6xeOMwmt

Malware Config

Extracted

Family

orcus

C2

195.88.218.126:10134

Mutex

10dc32abacca449b81dcabfd916e9f3f

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      GuardianQA.xlsm

    • Size

      3.7MB

    • MD5

      f9379219193a6ad229cb99ea103240cc

    • SHA1

      d7776b47f7d16e66d52ff3d2cda8af982f713ea4

    • SHA256

      8258c96fcb836d6b29aa90529835ed1ee4fe6143bb5221459fe5e4a81b18d2e6

    • SHA512

      c8fcb2db9ecdc4aa7aefd42fc003f8bd8c2a60d1ee59a4a6d573c422812b861487b0c79fd99de4e773afa60ddd4b36a5ee447089a382ddfdfce4ffa82e661a76

    • SSDEEP

      98304:JjD7OuWRWu3nj7fH2a6AuxvczmQjj+xwT+aNaHmt:JjOuaWu3H2a6xeOMwmt

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Orcurs Rat Executable

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks