General

  • Target

    8mO5VPmESbC6l1XN8ghS1bX409jT6inx

  • Size

    25KB

  • Sample

    250223-rjq3tsskt8

  • MD5

    1f8e5cef0742559bc7122d71254a7529

  • SHA1

    5699e66ce3237420a707db83f4462998d3f2902d

  • SHA256

    4056be88c0e703049b52b91bcccfa47f59210363701a2b055aaf0c880b3d13a7

  • SHA512

    f38c163abb7882103ad21404006a296007847eda750a03c73525504bfeb943f20832f5535a67a52bbcd9e6788590272ea34ca004fc560965c001facddc10ff40

  • SSDEEP

    384:g+HOe2ofFzH4WOER07sRcLqQL/9AR9YXrOtUW/gbcPh3w6:52c5UER07fpL/9AR9UvWIbIB

Malware Config

Extracted

Family

orcus

Botnet

Checker

C2

31.44.184.52:64515

Mutex

sudo_gxpx2fq5sk0wew147xrch8my31gbv3uf

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\linuxlinuxpython\bigloadtraffic.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Extracted

Family

orcus

Botnet

юзеры

C2

31.44.184.52:15475

Mutex

sudo_7npytx84tbpmsa73tqukm6m5ekld1o5x

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\phpjs\loweternal.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      8mO5VPmESbC6l1XN8ghS1bX409jT6inx

    • Size

      25KB

    • MD5

      1f8e5cef0742559bc7122d71254a7529

    • SHA1

      5699e66ce3237420a707db83f4462998d3f2902d

    • SHA256

      4056be88c0e703049b52b91bcccfa47f59210363701a2b055aaf0c880b3d13a7

    • SHA512

      f38c163abb7882103ad21404006a296007847eda750a03c73525504bfeb943f20832f5535a67a52bbcd9e6788590272ea34ca004fc560965c001facddc10ff40

    • SSDEEP

      384:g+HOe2ofFzH4WOER07sRcLqQL/9AR9YXrOtUW/gbcPh3w6:52c5UER07fpL/9AR9UvWIbIB

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Orcurs Rat Executable

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks