MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c9ad44b2a060ff9e8350a3cea2b178f7c384d6976f938f5248d16a2afa7ea426. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
OrcusRAT
Vendor detections: 10
| SHA256 hash: | c9ad44b2a060ff9e8350a3cea2b178f7c384d6976f938f5248d16a2afa7ea426 |
|---|---|
| SHA3-384 hash: | 9ad978050f464e338e7d76305bc55fbbff1edf6fd1b81749f8ee500b79f11037d95b1b970d6b5b92db81a10c3b928ded |
| SHA1 hash: | 095768947de61b6d3e8a7cfe30d9f17d797dbe9c |
| MD5 hash: | 2ffce162fbe99731f89bae751a8118a0 |
| humanhash: | diet-carpet-coffee-three |
| File name: | c9ad44b2a060ff9e8350a3cea2b178f7c384d6976f938f5248d16a2afa7ea426 |
| Download: | download sample |
| Signature | OrcusRAT |
| File size: | 742'912 bytes |
| First seen: | 2021-02-28 07:21:28 UTC |
| Last seen: | 2021-02-28 08:59:50 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:vrMXOQoepUanZi1oc8B3S29hF5Q71OHFIol/9NM9xQ7SC3ppjK:vUOQr3A1oc8B3S2vM71OHhln7SC3 |
| Threatray | 43 similar samples on MalwareBazaar |
| TLSH | 48F423F2578DDEFDCA6F02B04ECF598DB971D012C59A58317A768609EC1818B89FAF40 |
| Reporter | |
| Tags: | OrcusRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
1'564
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c9ad44b2a060ff9e8350a3cea2b178f7c384d6976f938f5248d16a2afa7ea426
Verdict:
Suspicious activity
Analysis date:
2021-02-28 08:30:43 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
OrcusRAT
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file
Creating a window
Searching for the window
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Sending a UDP request
Deleting a recently created file
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Connection attempt
Setting a keyboard event handler
Unauthorized injection to a recently created process
Enabling autorun for a service
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Orcus
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to inject threads in other processes
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Yara detected Costura Assembly Loader
Yara detected Orcus RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Barys
Status:
Malicious
First seen:
2021-02-27 02:57:00 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 33 additional samples on MalwareBazaar
Result
Malware family:
orcus
Score:
10/10
Tags:
family:orcus rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Drops desktop.ini file(s)
Loads dropped DLL
Executes dropped EXE
Orcus
Orcus Main Payload
Unpacked files
SH256 hash:
90e72b4e738e9da3ac1b7033fa099ede0554be96fcfa179526eec562d91291ac
MD5 hash:
372d83789a29dd9f04ffd4e8c9383e3d
SHA1 hash:
d01062c5d283e74f9ca3e2640ed9b6ed1932cc04
SH256 hash:
db3ca7be5b2bd49a1c69ae22a2eddabebe7f277b5e3b1f476497b8bbb39361c0
MD5 hash:
633d43f7b4e576511a3a04b0681af2b2
SHA1 hash:
45b730093e630e99698e2a53e12d53f1ea188b1d
SH256 hash:
dc1383dcf33b22cc3638b4c78f8e41e2895ef79878e96f3d6e1a16feb8fefcb5
MD5 hash:
7773dfc1db73c2a877bb78ee51c80b08
SHA1 hash:
95adbb23594248182ee061a51cf72a6198ef6729
SH256 hash:
f8d3f2982ceaecec5304585d5da80f1eb579861653504f3e0cc6a129defb1e3d
MD5 hash:
f65d17ce65db4c8fa22d4a1668c5048b
SHA1 hash:
7e362febba53e197e5455dbec59164a5676cded4
SH256 hash:
c9ad44b2a060ff9e8350a3cea2b178f7c384d6976f938f5248d16a2afa7ea426
MD5 hash:
2ffce162fbe99731f89bae751a8118a0
SHA1 hash:
095768947de61b6d3e8a7cfe30d9f17d797dbe9c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.