MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e65e1a32552f4be1f66f757d52f4544a997ffc41a93eabd7bbeacee5681ba54. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OrcusRAT


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 7 File information Comments

SHA256 hash: 4e65e1a32552f4be1f66f757d52f4544a997ffc41a93eabd7bbeacee5681ba54
SHA3-384 hash: 601f7201f0a378d51c108af6bc84507f51e209a0c95ae4833fd719479c62ab47054a0356067a86752eae6512a904dcdc
SHA1 hash: 7e741dccfbe87d2c688074abea5a701793faac56
MD5 hash: 55073fbca764ca83d9710cd3dc7c2d66
humanhash: glucose-carpet-tennessee-sad
File name:55073fbca764ca83d9710cd3dc7c2d66.exe
Download: download sample
Signature OrcusRAT
File size:12'800 bytes
First seen:2025-08-28 21:50:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 384:JxWw1FDagUZyB7BbRccEhVHLRpH/RpHZRYAbYyb1hu:Jxmcbcznkuy
Threatray 269 similar samples on MalwareBazaar
TLSH T167422D126BE94669FAF60F795D3346600673BE1A8E35C79D098C600E5FF35108A62FB3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe OrcusRAT


Avatar
abuse_ch
OrcusRAT C2:
91.237.124.194:10134

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
91.237.124.194:10134 https://threatfox.abuse.ch/ioc/1576650/

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
55073fbca764ca83d9710cd3dc7c2d66.exe
Verdict:
Malicious activity
Analysis date:
2025-08-28 21:52:31 UTC
Tags:
rat orcus auto-reg loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
orcus virus micro sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Launching a process
Creating a process with a hidden window
Creating a file
Сreating synchronization primitives
Connection attempt
Sending an HTTP GET request
Creating a file in the Windows directory
Creating a process from a recently created file
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt reconnaissance
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-25T02:02:00Z UTC
Last seen:
2025-08-25T02:02:00Z UTC
Hits:
~10
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Yara detected Orcus RAT
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1767339 Sample: PDv5t4PRBz.exe Startdate: 28/08/2025 Architecture: WINDOWS Score: 100 82 Suricata IDS alerts for network traffic 2->82 84 Found malware configuration 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 8 other signatures 2->88 9 PDv5t4PRBz.exe 15 12 2->9         started        14 svchost.exe 2->14         started        16 svchost.exe 2 2->16         started        18 6 other processes 2->18 process3 dnsIp4 80 198.251.89.176, 49691, 80 PONYNETUS United States 9->80 70 C:\Windows\1.exe, PE32 9->70 dropped 72 C:\Users\user\AppData\...\hcpj51en.cmdline, Unicode 9->72 dropped 74 C:\Users\user\AppData\Local\...\hcpj51en.0.cs, Unicode 9->74 dropped 76 C:\Users\user\AppData\...\PDv5t4PRBz.exe.log, ASCII 9->76 dropped 110 Drops executables to the windows directory (C:\Windows) and starts them 9->110 112 Adds a directory exclusion to Windows Defender 9->112 20 1.exe 9->20         started        24 powershell.exe 23 9->24         started        26 powershell.exe 23 9->26         started        30 2 other processes 9->30 114 Changes security center settings (notifications, updates, antivirus, firewall) 14->114 28 MpCmdRun.exe 14->28         started        file5 signatures6 process7 file8 60 C:\Windows\SysWOW64\WindowsInput.exe, PE32 20->60 dropped 62 C:\Program Files (x86)\...\System32.exe, PE32 20->62 dropped 64 C:\Windows\SysWOW64\WindowsInput.exe.config, XML 20->64 dropped 66 C:\...\System32.exe.config, XML 20->66 dropped 102 Antivirus detection for dropped file 20->102 104 Multi AV Scanner detection for dropped file 20->104 106 Drops executables to the windows directory (C:\Windows) and starts them 20->106 32 System32.exe 20->32         started        36 WindowsInput.exe 20->36         started        108 Loading BitLocker PowerShell Module 24->108 39 conhost.exe 24->39         started        41 conhost.exe 26->41         started        43 conhost.exe 28->43         started        68 C:\Users\user\AppData\Local\...\hcpj51en.dll, PE32 30->68 dropped 45 conhost.exe 30->45         started        47 conhost.exe 30->47         started        49 cvtres.exe 1 30->49         started        signatures9 process10 dnsIp11 78 91.237.124.194, 10134, 49692, 49698 MIRATEL-UA-ASUA Ukraine 32->78 56 C:\Users\user\AppData\Roaming\System32.exe, PE32 32->56 dropped 58 C:\Users\user\AppData\...\System32.exe.config, XML 32->58 dropped 51 System32.exe 32->51         started        94 Antivirus detection for dropped file 36->94 96 Multi AV Scanner detection for dropped file 36->96 98 Reads the Security eventlog 36->98 100 Reads the System eventlog 36->100 file12 signatures13 process14 signatures15 90 Antivirus detection for dropped file 51->90 92 Multi AV Scanner detection for dropped file 51->92 54 System32.exe 51->54         started        process16
Gathering data
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-08-25 06:59:25 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:orcus defense_evasion discovery execution persistence rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Modifies trusted root certificate store through registry
Orcurs Rat Executable
Orcus
Orcus family
Orcus main payload
Malware Config
C2 Extraction:
91.237.124.194:10134
Unpacked files
SH256 hash:
4e65e1a32552f4be1f66f757d52f4544a997ffc41a93eabd7bbeacee5681ba54
MD5 hash:
55073fbca764ca83d9710cd3dc7c2d66
SHA1 hash:
7e741dccfbe87d2c688074abea5a701793faac56
SH256 hash:
79d7c6f9b3fd674af575223901174d9087233489852644b2132e660f7058128f
MD5 hash:
29e3e5c2f7edf1e361a43b281a2da00e
SHA1 hash:
529e39587f0fe867a85234b6da0ce56a1d56f849
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_Download_To_SpecialFolder
Author:SECUINFRA Falcon Team
Description:Detects a .NET Binary that downloads further payload and retrieves a special folder
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments