General

  • Target

    7fiqk4pd.exe

  • Size

    11.5MB

  • Sample

    250222-vlthhswly2

  • MD5

    1cd88404177615666f5d2f077104db81

  • SHA1

    1a1506389e1a809bbcf0e96b90e78032099ae894

  • SHA256

    98e199c5086cfe34b10455f85854de85b9e6a55b5081368a7362e6a7fb1f23e4

  • SHA512

    b56b98c4d0cb4730039832be4355fb4598929fdcd4527a55336bfb593956218a383f75f26db96f7c94386aae15393ca27d9af6b09e0966c1f61af4fea39d9e71

  • SSDEEP

    196608:ys4REbKOxc6PpGAjMGhuPD5U4z1W903eV4Q9MToEuGxgh858F0ibfUM9gAB2bk92:/QEuOxHP8AxYD3W+eGQ9MTozGxu8C0iT

Malware Config

Extracted

Family

orcus

C2

dandev.us.to:1015

Mutex

33346576134e432b900bfc3fb9baec32

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %temp%\Updater.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\Watchdog.exe

Targets

    • Target

      7fiqk4pd.exe

    • Size

      11.5MB

    • MD5

      1cd88404177615666f5d2f077104db81

    • SHA1

      1a1506389e1a809bbcf0e96b90e78032099ae894

    • SHA256

      98e199c5086cfe34b10455f85854de85b9e6a55b5081368a7362e6a7fb1f23e4

    • SHA512

      b56b98c4d0cb4730039832be4355fb4598929fdcd4527a55336bfb593956218a383f75f26db96f7c94386aae15393ca27d9af6b09e0966c1f61af4fea39d9e71

    • SSDEEP

      196608:ys4REbKOxc6PpGAjMGhuPD5U4z1W903eV4Q9MToEuGxgh858F0ibfUM9gAB2bk92:/QEuOxHP8AxYD3W+eGQ9MTozGxu8C0iT

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks