General

  • Target

    ab3e0fb44baa3953d90abb3bb9e2115e0b377ac045293346d253239c1cc31c20

  • Size

    3.0MB

  • Sample

    250207-be6pqasras

  • MD5

    89ef44f9e5482ae5d43512ec8e587c5c

  • SHA1

    ce7fad1ba83ab2983d7d295f1c08adfb5844b1e9

  • SHA256

    ab3e0fb44baa3953d90abb3bb9e2115e0b377ac045293346d253239c1cc31c20

  • SHA512

    035cf2ef9f0584f3154d1eb26131db36450591c7698c90326dfa1f7c451883538bc98dc8f32cde8d6eb37f63c24a0a17ad93ed13732233860dc47044f34c2bc9

  • SSDEEP

    49152:us7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:usHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

Aimr.exe

C2

31.44.184.52:62202

Mutex

sudo_t6ncqk6hk5vy1eqdzgncve58khy2ykxt

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\privatevideo\AIMr.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      ab3e0fb44baa3953d90abb3bb9e2115e0b377ac045293346d253239c1cc31c20

    • Size

      3.0MB

    • MD5

      89ef44f9e5482ae5d43512ec8e587c5c

    • SHA1

      ce7fad1ba83ab2983d7d295f1c08adfb5844b1e9

    • SHA256

      ab3e0fb44baa3953d90abb3bb9e2115e0b377ac045293346d253239c1cc31c20

    • SHA512

      035cf2ef9f0584f3154d1eb26131db36450591c7698c90326dfa1f7c451883538bc98dc8f32cde8d6eb37f63c24a0a17ad93ed13732233860dc47044f34c2bc9

    • SSDEEP

      49152:us7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:usHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks