General
-
Target
66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253cN.exe
-
Size
1.8MB
-
Sample
250323-1kr6ys1js9
-
MD5
f989ff7a571201f40e54273508ddff80
-
SHA1
9cacdc239acc40450eae2c829ccb8288d73fcf72
-
SHA256
66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253c
-
SHA512
ac8667da670bd6b75a47c6c736ccac5d520669b4f44c55fb0b7ca813b8b9a3da19fa0003aaffe5b9615635f63abb2e45a5561516b8f444bfe9131f3279c32f0b
-
SSDEEP
49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZ:v
Static task
static1
Behavioral task
behavioral1
Sample
66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
127.0.0.1:7777
37ac276d673e458f96b24d45f7ec9f03
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Lime Crypter
-
taskscheduler_taskname
Orcus
-
watchdog_path
Temp\Lime Crypter
Targets
-
-
Target
66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253cN.exe
-
Size
1.8MB
-
MD5
f989ff7a571201f40e54273508ddff80
-
SHA1
9cacdc239acc40450eae2c829ccb8288d73fcf72
-
SHA256
66e5770f457bcfe9116390e4fdd2bbf76ac576b9afb50ae0da730601e4b4253c
-
SHA512
ac8667da670bd6b75a47c6c736ccac5d520669b4f44c55fb0b7ca813b8b9a3da19fa0003aaffe5b9615635f63abb2e45a5561516b8f444bfe9131f3279c32f0b
-
SSDEEP
49152:v5YjREzhJp52XHlUW8hKHXzzTiSTZdXTZdHXTZdXTZ:v
-
Orcus family
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-