General
-
Target
SlammysMonkeModLoader.exe
-
Size
3.3MB
-
Sample
250206-tb58ws1ndn
-
MD5
a6463b7f24d1114f142bc7eeef859e95
-
SHA1
7dea038f0bfb76be98d5a4c32958f3e066fe6a22
-
SHA256
eb905e93f90d65b25a5e441caf23fbf4d78c762ae71dcb732d9486870983e73c
-
SHA512
9a51355a6359e287e3a8383f3aca26397ac8494c24981bcf347e64e39ba2be59b030f255ee470cec7496a74b097cd24dc417aa68593b080e6426146e79431995
-
SSDEEP
98304:VwdKqu6ak9WXQ14pnx427k5utO0tabX2xuy:mdKquZk9WXQ2nRw5KuGxu
Static task
static1
Behavioral task
behavioral1
Sample
SlammysMonkeModLoader.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
Monkemodmanager
31.44.184.52:29846
sudo_cpktc6baomgolt2t3oa6l3h94z9nzjps
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\requesttemp\downloadsapi.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
SlammysMonkeModLoader.exe
-
Size
3.3MB
-
MD5
a6463b7f24d1114f142bc7eeef859e95
-
SHA1
7dea038f0bfb76be98d5a4c32958f3e066fe6a22
-
SHA256
eb905e93f90d65b25a5e441caf23fbf4d78c762ae71dcb732d9486870983e73c
-
SHA512
9a51355a6359e287e3a8383f3aca26397ac8494c24981bcf347e64e39ba2be59b030f255ee470cec7496a74b097cd24dc417aa68593b080e6426146e79431995
-
SSDEEP
98304:VwdKqu6ak9WXQ14pnx427k5utO0tabX2xuy:mdKquZk9WXQ2nRw5KuGxu
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-