General

  • Target

    BootstrapperNew.exe

  • Size

    3.0MB

  • Sample

    250206-tswe1szmhz

  • MD5

    7463b682190f219845ba70fd04846e76

  • SHA1

    70d1660295c9583db59168203c6df43a5e8cf133

  • SHA256

    49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

  • SHA512

    6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

  • SSDEEP

    49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

solara

C2

31.44.184.52:62202

Mutex

sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\updatelongpoll\BootstrapperNew.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      BootstrapperNew.exe

    • Size

      3.0MB

    • MD5

      7463b682190f219845ba70fd04846e76

    • SHA1

      70d1660295c9583db59168203c6df43a5e8cf133

    • SHA256

      49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

    • SHA512

      6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

    • SSDEEP

      49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks