General

  • Target

    e3c2fb827280a0b4479655df2ca9262750e8b7d71b0ffc6c3bc6456e2b8de4e8

  • Size

    3.0MB

  • Sample

    250204-bl9pyszmcx

  • MD5

    55e4ae26ddad23fa0c42bc81febd8310

  • SHA1

    01558a5ce19bafdae91b36c772215a21454ca89d

  • SHA256

    e3c2fb827280a0b4479655df2ca9262750e8b7d71b0ffc6c3bc6456e2b8de4e8

  • SHA512

    b8800adc3180f64df6fac1cfa512d55e44f6f7773f8ae5873801c3188a54dbfc463d4b0b6fe3bff930131bac5f01fe676a6aadb23da448fe00165c30e19713ab

  • SSDEEP

    49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbF:ZLHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

Новый тег

C2

31.44.184.52:27241

Mutex

sudo_13g0gn4plre1k4p5k4ckfe7y9vu69wll

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\datalifetraffic\wppacket.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      e3c2fb827280a0b4479655df2ca9262750e8b7d71b0ffc6c3bc6456e2b8de4e8

    • Size

      3.0MB

    • MD5

      55e4ae26ddad23fa0c42bc81febd8310

    • SHA1

      01558a5ce19bafdae91b36c772215a21454ca89d

    • SHA256

      e3c2fb827280a0b4479655df2ca9262750e8b7d71b0ffc6c3bc6456e2b8de4e8

    • SHA512

      b8800adc3180f64df6fac1cfa512d55e44f6f7773f8ae5873801c3188a54dbfc463d4b0b6fe3bff930131bac5f01fe676a6aadb23da448fe00165c30e19713ab

    • SSDEEP

      49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qbF:ZLHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks