Resubmissions

26/02/2025, 15:12

250226-sln7patpt6 10

General

  • Target

    https://gofile.io/d/QSNV0L

  • Sample

    250226-sln7patpt6

Malware Config

Extracted

Family

xworm

C2

31.166.229.37 :1234

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Extracted

Family

orcus

C2

31.166.229.37:10134

Mutex

301833fbc1d64f30849d7fadb68bf07c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\MicrosoftWindowsDefenderComSuggorateVirusNotVirus\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Realtek audio driver

  • watchdog_path

    AppData\Hotdog.exe

Targets

    • Target

      https://gofile.io/d/QSNV0L

    • Detect Xworm Payload

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Orcurs Rat Executable

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks