General

  • Target

    NEGR.exe

  • Size

    907KB

  • Sample

    250401-jc7g8syjz2

  • MD5

    c37aede530770e4960f21ca09f3a8e1c

  • SHA1

    588a47f35d6c90ed47c433da4fdb35309cb8f166

  • SHA256

    67186135fcb9c521054eafaeab47b5c6c92f25a97c35f8178bee5778e4d45636

  • SHA512

    0f880912f868d7a678e01fe6f7ba09889a9d465bb033e9fc5993f59a5144b8c7b75cc1009c000f6d3f3a584d3954c9beb4ce938bc80b1b2aebe78f139dd65dc4

  • SSDEEP

    24576:N3s4MROxnFj3G73MJJXRrZlI0AilFEvxHiWB:N3/Mi1kOhrZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

Botnet

negr

C2

213.209.143.58:2095

Mutex

aab067bbecf6478ca540d713fe8e0084

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      NEGR.exe

    • Size

      907KB

    • MD5

      c37aede530770e4960f21ca09f3a8e1c

    • SHA1

      588a47f35d6c90ed47c433da4fdb35309cb8f166

    • SHA256

      67186135fcb9c521054eafaeab47b5c6c92f25a97c35f8178bee5778e4d45636

    • SHA512

      0f880912f868d7a678e01fe6f7ba09889a9d465bb033e9fc5993f59a5144b8c7b75cc1009c000f6d3f3a584d3954c9beb4ce938bc80b1b2aebe78f139dd65dc4

    • SSDEEP

      24576:N3s4MROxnFj3G73MJJXRrZlI0AilFEvxHiWB:N3/Mi1kOhrZlI0AilFEvxHi

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks