General

  • Target

    5f53ce3ee2fdbcf24441cfc655ddcac4e64e5b06b120d861a4da5e103caada6c

  • Size

    2.9MB

  • Sample

    250205-bng3qasjhx

  • MD5

    8bf39491c56a1a7df9752f0494ede1dc

  • SHA1

    2d931d566eb0ea049e85790866879d334eaca5cd

  • SHA256

    5f53ce3ee2fdbcf24441cfc655ddcac4e64e5b06b120d861a4da5e103caada6c

  • SHA512

    a6075465d1c960f54e39b7f0463d8b642265c1b1105526776e246ecb65b385f90b9c3d35bf98517c45242010ae2046da88da79c4e10cf5f7d60a58abdda841c2

  • SSDEEP

    49152:vqf9jxfzZKM61I8mC/Qg3zaY4MUpdgHAypQxbWo9JnCmgbTrfkIgAilFCvxHZ3u:vq1jxA1+C9DapRcgypSbWo9JCm

Malware Config

Extracted

Family

orcus

C2

192.168.1.102:10135

Mutex

7525415d326f43ec9c2f59212362ba0b

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      5f53ce3ee2fdbcf24441cfc655ddcac4e64e5b06b120d861a4da5e103caada6c

    • Size

      2.9MB

    • MD5

      8bf39491c56a1a7df9752f0494ede1dc

    • SHA1

      2d931d566eb0ea049e85790866879d334eaca5cd

    • SHA256

      5f53ce3ee2fdbcf24441cfc655ddcac4e64e5b06b120d861a4da5e103caada6c

    • SHA512

      a6075465d1c960f54e39b7f0463d8b642265c1b1105526776e246ecb65b385f90b9c3d35bf98517c45242010ae2046da88da79c4e10cf5f7d60a58abdda841c2

    • SSDEEP

      49152:vqf9jxfzZKM61I8mC/Qg3zaY4MUpdgHAypQxbWo9JnCmgbTrfkIgAilFCvxHZ3u:vq1jxA1+C9DapRcgypSbWo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

MITRE ATT&CK Enterprise v15

Tasks