General

  • Target

    1806529b170be4bbe19aff809a669b9ee1ca761cbfc82bb113ca591ad0da7e2f

  • Size

    907KB

  • Sample

    240702-b4sjds1hra

  • MD5

    b2e4362b9f96ec4188f662819fd0ed95

  • SHA1

    f8bfd2340039c904f459136c6b6abc4bcfa68e93

  • SHA256

    1806529b170be4bbe19aff809a669b9ee1ca761cbfc82bb113ca591ad0da7e2f

  • SHA512

    0315b4b5fc6351615a20cb80cb61ebd3aaeeac562c89fac53fe44f7d6757eb1a9a04c2bd90a7682ad6105c7c9802efe44aeea22d4522f384c1f886a239463359

  • SSDEEP

    24576:i554MROxnFMptJSvrrcI0AilFEvxHP7ooI:iQMiqTSvrrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

10.9.164.122:9999

Mutex

c3d53f9fe37146cb9de31d6e16e18ac2

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Targets

    • Target

      1806529b170be4bbe19aff809a669b9ee1ca761cbfc82bb113ca591ad0da7e2f

    • Size

      907KB

    • MD5

      b2e4362b9f96ec4188f662819fd0ed95

    • SHA1

      f8bfd2340039c904f459136c6b6abc4bcfa68e93

    • SHA256

      1806529b170be4bbe19aff809a669b9ee1ca761cbfc82bb113ca591ad0da7e2f

    • SHA512

      0315b4b5fc6351615a20cb80cb61ebd3aaeeac562c89fac53fe44f7d6757eb1a9a04c2bd90a7682ad6105c7c9802efe44aeea22d4522f384c1f886a239463359

    • SSDEEP

      24576:i554MROxnFMptJSvrrcI0AilFEvxHP7ooI:iQMiqTSvrrcI0AilFEvxHP

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus main payload

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks