General

  • Target

    8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798.exe

  • Size

    1.8MB

  • Sample

    250323-14w91sxxhz

  • MD5

    2640fafb4430882ed76a2883137d92d0

  • SHA1

    b39a7cfb8afccdde28b2dfee98f711d68c0653cc

  • SHA256

    8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798

  • SHA512

    48f17f0aee19723a19a739deef3857d5fa25d6e959faacf1700e14490f7b00a1a51724e93a391ad6f4884a38eb13d136aa05b2d0ff569d5e13e45a8a3caf1deb

  • SSDEEP

    49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZv:v2

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:7777

Mutex

37ac276d673e458f96b24d45f7ec9f03

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Lime Crypter

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    Temp\Lime Crypter

Targets

    • Target

      8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798.exe

    • Size

      1.8MB

    • MD5

      2640fafb4430882ed76a2883137d92d0

    • SHA1

      b39a7cfb8afccdde28b2dfee98f711d68c0653cc

    • SHA256

      8f00b950a514e95daaad5ef6d5faa6c3132b7f4ce8bef72d864bc67b3a2fc798

    • SHA512

      48f17f0aee19723a19a739deef3857d5fa25d6e959faacf1700e14490f7b00a1a51724e93a391ad6f4884a38eb13d136aa05b2d0ff569d5e13e45a8a3caf1deb

    • SSDEEP

      49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZv:v2

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks