General
-
Target
BootstrapperNew.exe
-
Size
3.0MB
-
Sample
250206-tswe1szmhz
-
MD5
7463b682190f219845ba70fd04846e76
-
SHA1
70d1660295c9583db59168203c6df43a5e8cf133
-
SHA256
49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20
-
SHA512
6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2
-
SSDEEP
49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20240729-en
Malware Config
Extracted
orcus
solara
31.44.184.52:62202
sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\updatelongpoll\BootstrapperNew.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
BootstrapperNew.exe
-
Size
3.0MB
-
MD5
7463b682190f219845ba70fd04846e76
-
SHA1
70d1660295c9583db59168203c6df43a5e8cf133
-
SHA256
49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20
-
SHA512
6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2
-
SSDEEP
49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-