General

  • Target

    BootstrapperNew (1).exe

  • Size

    3.0MB

  • Sample

    250206-ttq7paznb1

  • MD5

    7463b682190f219845ba70fd04846e76

  • SHA1

    70d1660295c9583db59168203c6df43a5e8cf133

  • SHA256

    49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

  • SHA512

    6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

  • SSDEEP

    49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

solara

C2

31.44.184.52:62202

Mutex

sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\updatelongpoll\BootstrapperNew.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      BootstrapperNew (1).exe

    • Size

      3.0MB

    • MD5

      7463b682190f219845ba70fd04846e76

    • SHA1

      70d1660295c9583db59168203c6df43a5e8cf133

    • SHA256

      49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

    • SHA512

      6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

    • SSDEEP

      49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks