General

  • Target

    778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38

  • Size

    924KB

  • Sample

    240701-bfgrzsvbrl

  • MD5

    0ee7e99678417ed9774308a536b29429

  • SHA1

    90b5785ce51cf35c2bc176aafd42ddb75e945135

  • SHA256

    778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38

  • SHA512

    0a7c6657c6650d4ce88b1a25312f5c3a84077966558f97459aa60e7f36234f0883fd9c2f5148ae93a6eedd524a99aa45dd41f4c0ae816e4d9895a3375630570e

  • SSDEEP

    24576:lmHR4MROxnFE3kO30rrcI0AilFEvxHPNBoog:suMiuB0rrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

192.168.56.1:32123

Mutex

a2a32c9071074ce38ee0f2d33ff430a3

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    ti pidorasik

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38

    • Size

      924KB

    • MD5

      0ee7e99678417ed9774308a536b29429

    • SHA1

      90b5785ce51cf35c2bc176aafd42ddb75e945135

    • SHA256

      778a38eda2e11ab63431790b1839e9e4893e9090956ae1fee73602978d8cbb38

    • SHA512

      0a7c6657c6650d4ce88b1a25312f5c3a84077966558f97459aa60e7f36234f0883fd9c2f5148ae93a6eedd524a99aa45dd41f4c0ae816e4d9895a3375630570e

    • SSDEEP

      24576:lmHR4MROxnFE3kO30rrcI0AilFEvxHPNBoog:suMiuB0rrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks