General
-
Target
6570333ca5a7600ae322ac5d40abfe94fb28e214a3f66c6afdcac49efc6ac259
-
Size
3.0MB
-
Sample
250216-bf1j4atnfn
-
MD5
56e3c90e2b5608560dcdeaf165b2add4
-
SHA1
34f0785170c41431590496cba14c5fec88246342
-
SHA256
6570333ca5a7600ae322ac5d40abfe94fb28e214a3f66c6afdcac49efc6ac259
-
SHA512
deab07794c8c8a32c1dfeb35d8d5646e664effaa91ec50f50cda47c8cc6167e3e6203753b4adcfb648df64bb04d4db4a111115447041f8e59e2aa77c69b3c97e
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Behavioral task
behavioral1
Sample
6570333ca5a7600ae322ac5d40abfe94fb28e214a3f66c6afdcac49efc6ac259.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:44893
sudo_nfst2x5rm0v91ihqpu8f1mos4pb7dzzy
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\pythonprotectlinux\geosql.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Targets
-
-
Target
6570333ca5a7600ae322ac5d40abfe94fb28e214a3f66c6afdcac49efc6ac259
-
Size
3.0MB
-
MD5
56e3c90e2b5608560dcdeaf165b2add4
-
SHA1
34f0785170c41431590496cba14c5fec88246342
-
SHA256
6570333ca5a7600ae322ac5d40abfe94fb28e214a3f66c6afdcac49efc6ac259
-
SHA512
deab07794c8c8a32c1dfeb35d8d5646e664effaa91ec50f50cda47c8cc6167e3e6203753b4adcfb648df64bb04d4db4a111115447041f8e59e2aa77c69b3c97e
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
-
Orcus family
-
Orcurs Rat Executable
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-