General
-
Target
BoostWare.exe
-
Size
9.6MB
-
Sample
250226-w8w3layq13
-
MD5
1dc82cdf4c25c697678c3d95e12c494a
-
SHA1
7e52934ffb36810cc3ed9974e7f650a9f2e1ba2e
-
SHA256
5cf6ff4162d3eb61d3877ca0f2ab3174b95e210a8424134d4bc8698ba33e0ff3
-
SHA512
5531feda823aa5d73f3538b22731dd54b93e15da9ce4f3e52ec380e99b52dcb7ad269fd532784a92b76deb8c2365cc190b8f784c18af7f4115612df01272ac2c
-
SSDEEP
196608:XDPBJeZiU597HSECgB3Io5kG8s/CjAWmRYsDb7dXkDoJNrEiKkQQCncv:XFQZig97y0B375GIC0Qs8ovrEXcv
Static task
static1
Behavioral task
behavioral1
Sample
BoostWare.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BoostWare.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
orcus
Fortnite
82.9.246.24:8808
f65beca88ddb49089d3a6be2931bc598
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\Microsoft\Skype.exe
-
reconnect_delay
10000
-
registry_keyname
Skype
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\Skype.exe
Targets
-
-
Target
BoostWare.exe
-
Size
9.6MB
-
MD5
1dc82cdf4c25c697678c3d95e12c494a
-
SHA1
7e52934ffb36810cc3ed9974e7f650a9f2e1ba2e
-
SHA256
5cf6ff4162d3eb61d3877ca0f2ab3174b95e210a8424134d4bc8698ba33e0ff3
-
SHA512
5531feda823aa5d73f3538b22731dd54b93e15da9ce4f3e52ec380e99b52dcb7ad269fd532784a92b76deb8c2365cc190b8f784c18af7f4115612df01272ac2c
-
SSDEEP
196608:XDPBJeZiU597HSECgB3Io5kG8s/CjAWmRYsDb7dXkDoJNrEiKkQQCncv:XFQZig97y0B375GIC0Qs8ovrEXcv
-
Orcus family
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1