General

  • Target

    tar.exe

  • Size

    3.0MB

  • Sample

    250203-jyp53svrdz

  • MD5

    bf7895e063d2bc2e2df12a0808369f74

  • SHA1

    c0b6158b47aee66cbe68885e582f20a388b0b146

  • SHA256

    53ef45215a305cdeb6a25dcb51c691af9f4d545534d78e102d125536baa608b7

  • SHA512

    e664d6a6e763c27738ef5472bab2fdf6334083756e2bbb8a92b43f29bac7f557e548f53a16c2f2d28df713744b3d9d88911ae75ca55acd8af24110641bbf1ffa

  • SSDEEP

    49152:gAkDf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmYWncFf0I74gu3yM:gPyb2MnjQBEUNypSb6o9JCm

Malware Config

Extracted

Family

orcus

C2

108.231.94.28:10134

Mutex

2c09a108509b4d9aa6f48e001c264c91

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      tar.exe

    • Size

      3.0MB

    • MD5

      bf7895e063d2bc2e2df12a0808369f74

    • SHA1

      c0b6158b47aee66cbe68885e582f20a388b0b146

    • SHA256

      53ef45215a305cdeb6a25dcb51c691af9f4d545534d78e102d125536baa608b7

    • SHA512

      e664d6a6e763c27738ef5472bab2fdf6334083756e2bbb8a92b43f29bac7f557e548f53a16c2f2d28df713744b3d9d88911ae75ca55acd8af24110641bbf1ffa

    • SSDEEP

      49152:gAkDf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmYWncFf0I74gu3yM:gPyb2MnjQBEUNypSb6o9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks