General

  • Target

    66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253cN.exe

  • Size

    1.8MB

  • Sample

    250323-1kr6ys1js9

  • MD5

    f989ff7a571201f40e54273508ddff80

  • SHA1

    9cacdc239acc40450eae2c829ccb8288d73fcf72

  • SHA256

    66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253c

  • SHA512

    ac8667da670bd6b75a47c6c736ccac5d520669b4f44c55fb0b7ca813b8b9a3da19fa0003aaffe5b9615635f63abb2e45a5561516b8f444bfe9131f3279c32f0b

  • SSDEEP

    49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZ:v

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:7777

Mutex

37ac276d673e458f96b24d45f7ec9f03

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Lime Crypter

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    Temp\Lime Crypter

Targets

    • Target

      66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253cN.exe

    • Size

      1.8MB

    • MD5

      f989ff7a571201f40e54273508ddff80

    • SHA1

      9cacdc239acc40450eae2c829ccb8288d73fcf72

    • SHA256

      66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253c

    • SHA512

      ac8667da670bd6b75a47c6c736ccac5d520669b4f44c55fb0b7ca813b8b9a3da19fa0003aaffe5b9615635f63abb2e45a5561516b8f444bfe9131f3279c32f0b

    • SSDEEP

      49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZ:v

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks