General
-
Target
BootstrapperNew (1).exe
-
Size
3.0MB
-
Sample
250206-ttq7paznb1
-
MD5
7463b682190f219845ba70fd04846e76
-
SHA1
70d1660295c9583db59168203c6df43a5e8cf133
-
SHA256
49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20
-
SHA512
6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2
-
SSDEEP
49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
BootstrapperNew (1).exe
Resource
win11-20241007-en
Malware Config
Extracted
orcus
solara
31.44.184.52:62202
sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\updatelongpoll\BootstrapperNew.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
BootstrapperNew (1).exe
-
Size
3.0MB
-
MD5
7463b682190f219845ba70fd04846e76
-
SHA1
70d1660295c9583db59168203c6df43a5e8cf133
-
SHA256
49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20
-
SHA512
6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2
-
SSDEEP
49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcus main payload
-
Orcurs Rat Executable
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1