General
-
Target
8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798.exe
-
Size
1.8MB
-
Sample
250323-14w91sxxhz
-
MD5
2640fafb4430882ed76a2883137d92d0
-
SHA1
b39a7cfb8afccdde28b2dfee98f711d68c0653cc
-
SHA256
8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798
-
SHA512
48f17f0aee19723a19a739deef3857d5fa25d6e959faacf1700e14490f7b00a1a51724e93a391ad6f4884a38eb13d136aa05b2d0ff569d5e13e45a8a3caf1deb
-
SSDEEP
49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZv:v2
Static task
static1
Behavioral task
behavioral1
Sample
8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798.exe
Resource
win7-20250207-en
Malware Config
Extracted
orcus
127.0.0.1:7777
37ac276d673e458f96b24d45f7ec9f03
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Lime Crypter
-
taskscheduler_taskname
Orcus
-
watchdog_path
Temp\Lime Crypter
Targets
-
-
Target
8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798.exe
-
Size
1.8MB
-
MD5
2640fafb4430882ed76a2883137d92d0
-
SHA1
b39a7cfb8afccdde28b2dfee98f711d68c0653cc
-
SHA256
8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798
-
SHA512
48f17f0aee19723a19a739deef3857d5fa25d6e959faacf1700e14490f7b00a1a51724e93a391ad6f4884a38eb13d136aa05b2d0ff569d5e13e45a8a3caf1deb
-
SSDEEP
49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZv:v2
-
Orcus family
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-