General

  • Target

    a658af86620c88e805af49a8c4422d8e3284316fb9687a0d723e71f224d712c7

  • Size

    3.0MB

  • Sample

    240607-b1ztasfd6z

  • MD5

    b480f15af8c87b7146a5ae304d8887c9

  • SHA1

    800b54bc03123bddd00a3fed75f503a78e962f23

  • SHA256

    a658af86620c88e805af49a8c4422d8e3284316fb9687a0d723e71f224d712c7

  • SHA512

    81aac615041f270a974b8fbebad4ec86f0b17c57bb633e25da510e63c4498ffd5f02165033747e96e0993419c59ce1704fd6bbef79e506fe49b0b5e8c950c7f0

  • SSDEEP

    49152:O3X27p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpEu/nRFfjI7L0qb:OWHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

plaki plaki

C2

31.44.184.52:29613

Mutex

sudo_y6kxwm3c0l7atyypwtp1qnfdustfx6xq

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    C:\Users\Public\Photos\Microsoft Update Health Service.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      a658af86620c88e805af49a8c4422d8e3284316fb9687a0d723e71f224d712c7

    • Size

      3.0MB

    • MD5

      b480f15af8c87b7146a5ae304d8887c9

    • SHA1

      800b54bc03123bddd00a3fed75f503a78e962f23

    • SHA256

      a658af86620c88e805af49a8c4422d8e3284316fb9687a0d723e71f224d712c7

    • SHA512

      81aac615041f270a974b8fbebad4ec86f0b17c57bb633e25da510e63c4498ffd5f02165033747e96e0993419c59ce1704fd6bbef79e506fe49b0b5e8c950c7f0

    • SSDEEP

      49152:O3X27p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpEu/nRFfjI7L0qb:OWHTPJg8z1mKnypSbRxo9JCm

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks