General

  • Target

    fc3bcb43a8ba80aa5256e20adcd1a165f3d32c144d78b6bf57bafbefd25f4088.exe

  • Size

    1.1MB

  • Sample

    250324-m3d56ax1dx

  • MD5

    6d05f3f6bf003449ecec1d7b1c03a090

  • SHA1

    6f8c16b2dbbfb990f647dfbb20777707637cdc65

  • SHA256

    fc3bcb43a8ba80aa5256e20adcd1a165f3d32c144d78b6bf57bafbefd25f4088

  • SHA512

    cc70f031102955d972826d80db163f2249d996dca53102a73afe09f68db550493077e704c07b39c7fbfd9267465e322d89ff4a383aaecf25cb4a0817080b79ba

  • SSDEEP

    24576:f7R4MROxnFl3czErrcI0AilFEvxHPgook/IRx1FPDRyRAVy5pW:fSMir1rrcI0AilFEvxHP7/IRx1FPDRyK

Malware Config

Extracted

Family

orcus

C2

h0metowgh0svi3ws.servequake.com:10114

Mutex

f4a241c2356f470581f678498d8553bb

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\winupdate\Winupdates.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\WinupdateWatchdog.exe

Targets

    • Target

      fc3bcb43a8ba80aa5256e20adcd1a165f3d32c144d78b6bf57bafbefd25f4088.exe

    • Size

      1.1MB

    • MD5

      6d05f3f6bf003449ecec1d7b1c03a090

    • SHA1

      6f8c16b2dbbfb990f647dfbb20777707637cdc65

    • SHA256

      fc3bcb43a8ba80aa5256e20adcd1a165f3d32c144d78b6bf57bafbefd25f4088

    • SHA512

      cc70f031102955d972826d80db163f2249d996dca53102a73afe09f68db550493077e704c07b39c7fbfd9267465e322d89ff4a383aaecf25cb4a0817080b79ba

    • SSDEEP

      24576:f7R4MROxnFl3czErrcI0AilFEvxHPgook/IRx1FPDRyRAVy5pW:fSMir1rrcI0AilFEvxHP7/IRx1FPDRyK

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks