{"id":3978,"date":"2022-11-03T06:00:36","date_gmt":"2022-11-03T06:00:36","guid":{"rendered":"\/cybersecurity-blog\/?p=3048"},"modified":"2023-03-27T13:57:30","modified_gmt":"2023-03-27T13:57:30","slug":"orcus-rat-malware-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/","title":{"rendered":"What is Orcus RAT? Technical Analysis and Malware Configuration"},"content":{"rendered":"\n<p>Our malware analysts are always on the lookout for and researching various malicious samples. This time we came across Orcus RAT in <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN online malware sandbox<\/a> and decided to perform a technical malware analysis. In this article, you will learn how this RAT stores and protects its configuration and how to write the memory dump extractor in Python.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Orcus RAT?<\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/malware-trends\/orcus?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=mtt\" target=\"_blank\">Orcus<\/a> is a Remote Access Trojan with some distinctive processes. The RAT allows attackers to create plugins and offers a robust core feature set that makes it quite a dangerous malicious program in its class.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"587\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic.jpg\" alt=\"\" class=\"wp-image-4060\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic.jpg 841w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-300x209.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-768x536.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-370x258.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-270x188.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-570x398.jpg 570w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/Orcus-RAT-infographic-740x517.jpg 740w\" sizes=\"(max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Orcus RAT malware analysis<\/h2>\n\n\n\n<p>The sample for the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-do-malware-analysis-infographic\/\" target=\"_blank\">malware analysis<\/a> has been obtained from the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/submissions?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=submissions\" target=\"_blank\">ANY.RUN database<\/a>. You can find it and follow along:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td>SHA-256<\/td><td>258a75a4dee6287ea6d15ad7b50b35ac478c156f0d8ebfc978c6bbbbc4d441e1<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>We downloaded the Orcus RAT sample and opened it in DiE to get basic information:<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/qVydFyGaOG0q1TGx-NTW0GOhN0er_hRGT23SH1wuyPvc2OkZxrp3NK4uq8eRrS3vNf33Fh76F6vo_8EJRaBm8xS_GmrBQ8cQt0ykY7WmwNKZucKWBpbDe89H3uKMuZy_eQjz-_00qWUwj7CADPcxgj9jSb229WKY4GEU1YpeXG3SDr4sBZTvx-S7Pw\" alt=\"Sample overview in DiE\"\/><\/figure>\n\n\n\n<p>The DiE results show that we are dealing with a .NET sample. And it\u2019s high time to start malware analysis of Orcus. For this matter, DnSpy comes in handy.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/vl0O0q9drKbVuzHqntUemiQtrLfspsSMa7nUfYmsFMeO3hxw8Sjvr77K1cnGZzDPgk-uM5ASjHkvyxqrXhtvkB8RFh3iiqu-jxv4lCcwvp7ZQ-2yev9Bn9tyxW_8vF0ECDBGX7phZlg4RIJnV76QsHTumfbSNXRBGKszOyvnAyobpag320HEZHcJxg\" alt=\"Sample overview in DnSpy\n\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Orcus RAT classes overview<\/h3>\n\n\n\n<p>Our primary research goal is to find the RAT configuration. The first destination point is malware classes. While going through them, we bump into a namespace called Orcus.Config, and it contains the following classes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Consts <\/strong>include information about the different files and directories that Orcus RAT uses. For example, the path to the file where user keystrokes are saved or to the directory where the plugins used by a sample reside.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/iwODqADB4rb-6-bDI4qmjeTRNZanNrzKzjrqPBJixmfdNPvWr8fghiLMopuKFovkM3WWa5UFMLFheYrJrGKWt5JwTKHKg1VXFjJXw-IhEps0wuZ8kVS2A7Xzl72V883FhfsWKC484Yie12oPIqCDyFDAKdnB84KUcdSc2ncVIPy2xTcwBXfypG-7PQ\" alt=\"Orcus.Config.Consts class overview in DnSpy\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Settings <\/strong>contain wrapper methods for decrypting the malware configuration and its plugins.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/xvfyp2_k_C_0-mbw4ANrpYFoPWcQrDfLKXc9M-Yia-UT1hM0AnLD5kB77EZzZ2cwGs0pbUHukwRnHLrUOAdP7CUcWI1m88RG8isdOrtJnxVROGN3CwtOXfjZQnThuWxIVUvK3dXd8ubTPowJFt8pkMjkqoGyaU4Pa0ZeBpCuch72bCs_Dftjqs9GGQ\" alt=\"Orcus.Config.Settings class overview in DnSpy\n\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SettingsData <\/strong>is a static class only with the encrypted malware and plugin configuration fields.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/PfaCQcTuAFnSiCMz8S4kPyfIQz90ApQYQDKJhYYHeIrma2JexQmEg7WVVxKnjEH6xg1iGZIVdBg2OB4VwJFkcY9dRHcQwnDkGmFs3i5i-0IENs9_iBEA2uMicrAjeQTaJlBOgegSwDdcqU0G4H0FnY7dvwkSk34yZpzWIGduIifqHDkGweWhBFHttA\" alt=\"Orcus.Config.SettingsData class overview in DnSpy\n\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Orcus malware resources<\/h3>\n\n\n\n<p>Inside the <strong>Settings<\/strong> class, we see the <strong>GetDecryptedSettings<\/strong> method. Later, it calls out the <strong>AES.Decrypt<\/strong>. After noticing it, we can suppose that the AES algorithm encrypts the malware configuration:<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/meW9KBs4mVe7jt1k_xOxVNZOA_gyuvf7GuaDyiH9BrY0fs-1RYl9Ro1fqui3FVwwFBfRmUMxrZa6lJCTyIaTXhKYZcAkWwTWB0AvkRjSDPTEtPnKurVPNiwqhMvm7N5dYVtb1wPSctTuUlJXRzGv-LtgkMfCSO4qQWhKs8Vv1hjwY1Bbjff39m87Xg\" alt=\"GetDecryptedSettings method\n\" width=\"844\" height=\"177\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The <strong>AES<\/strong> class is imported from the <strong>Orcus.Shared.Encryption<\/strong>. The only problem is that the assembly doesn\u2019t contain such a namespace. To find it, we can go to the Orcus RAT resources:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/hHx3ov3_XMJLZ17lGcQkmRslkaGkUa7pktzz4ytlvKPYfFfr3rX_JOepmZAN8mX3Qbi1xH12s4gkzSr8AhlwEQ_4qrIH0U4L60ETc3h6IouAL7kO97TWaLhF7ksrI2floLgLrT1ZrCv--tjrB72N88ba8ubSarJ2OcwolMUpGMlxkEki5T3N2_JmtQ\" alt=\"Orcus resources revealed in DnSpy\n\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>We seem to have found an assembly <strong>orcus.shared.<\/strong> But what is this <strong>costura<\/strong> prefix? And why is the assembly stored with a .zip extension? We extracted this resource and tried to unpack it. Unfortunately, it was a miss \u2013 despite the .zip extension, this resource is not an archive.<br><\/p>\n\n\n\n<p>Realizing that, at some point, this assembly must be loaded into the application, we make a decision to look for another place where this happens. Of course, keeping that strange costura prefix in mind. And it didn&#8217;t take us long \u2013 we have found the <strong>Costura<\/strong> namespace that contains the <strong>AssemblyLoader<\/strong> class. It is supposed to load the assemblies packed in Orcus resources.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/_MiZO382GgQ--QoweZFMOhGfomgrCyfgMkEkASo7EWtTGX6WMiMY1bVxupipM2QUFPkBsyl5vZjXTfEMJFpKPYII7HkYihj1F81VQZVCcTr4eIsIPSR4tL54C3bEt01miFxIq9CcKiLyDwiH-HjqaLlfmfItejcBLM9qHy3ttbJR0c_p7gaMv48ejw\" alt=\"AssemblyLoader class of Costura packer\n\"\/><\/figure>\n\n\n\n<p>Inside the AssemblyLoader class, we have caught how assemblies are loaded from resources:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/R8INnuRgE32VVs6t5sDyd0tQb9JP40mNsUh_fhwf7kNxL3Lc6PdrbRUo8b1ihTWQWoBhAAmYN-9sEQIevNP1dka8BUaHc5dIkRpCv9p7K1-wdTjgmfjgFedxYCokgRdLK1C_TxRkQhDupHYn6uswOyvxbw40Ell_ctIdltMd-nElyeuVtTDksQgDGA\" alt=\"Costura packer using DeflateStream to unpack embedded assemblies\"\/><\/figure>\n\n\n\n<p>After repeating this operation with<a href=\"https:\/\/gchq.github.io\/CyberChef\/#recipe=Raw_Inflate(0,0,'Adaptive',false,false)\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> CyberChef,<\/a> we got an unpacked assembly.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Sh6O04AKAlj7GbKiopiUTfRs_j6JpN8tRfIvEXdczuN7AVA9nyLqQGUYzRkU1zB4PFgbyS7l6QttLdTPloeoLSgtHJTfOsKrVkjERHGjMWeGmwcS6gBQCAylvJbcoNVKsg9q0usHKxaMsSFzqqook13JNhxdlO8L76atsp5cZHqIwb1Lt3mSKiiHMw\" alt=\"Raw Inflate in CyberChef saves the day\n\"\/><\/figure>\n\n\n\n<p>To avoid any second thoughts, we upload the unpacked assembly to DnSpy. Hopefully, it can confirm or deny our assumption about the encryption algorithm used by the Orcus RAT.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/RZx5LQ41A0WJH95YIWFvYIvEkqdYhJqJi7qBmsf8JASuTt99xPmThe-oUKYfxTSjoRhvJx93xqCvFAPP2NMYpEI30NlPLijBpQDWR7cKyS_tmIWL5lVjHM-M3ltmK2fU40_Dfrz7_KYM9-9FKLZYoBXl2goGel4bU9geI_lrmOw_RRafSoLl3NTjyw\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This class contains methods for encrypting and decrypting data, as well as an initialization vector field for the AES algorithm and a field with the key length. We are not really interested in the <strong>encryption<\/strong> process, but the data <strong>decryption<\/strong> is exactly what we need:<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/7SNvE88Lb4B3QQJCxgVtl2r-9yogbM_rEolwiP0y1HvxYCagZ8AaBf3gd-m1AfolVyZiuj0XYpaTRkI2FCBJ_TBy54F71Nr2UYVI85Wbfx0LHPoPjBQXV1nY3-gynK7DC0kbOmJoeO41lP-CDulvIFJt2W3ycY4-zBWDRM9N5HLXtQOL2QgY0PgK2w\" alt=\"AES decryption implementation\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Orcus RAT data decryption<\/h3>\n\n\n\n<p>We have found out the following information concerning data decryption:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Base64<\/strong> is applied to the encrypted data besides the AES algorithm.<\/li>\n\n\n\n<li>The exact encryption type is AES256-CBC.<\/li>\n\n\n\n<li>We identified how the encryption key is derived.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Let\u2019s discuss this stage, this one is definitely interesting. To generate the key for a given string, Orcus uses the <strong>PasswordDeriveBytes<\/strong> class, which is based on the <strong>PBKDF1<\/strong> algorithm from Microsoft. The malware uses the default settings: it means that the number of iterations for key generation will be 100, and the hashing algorithm will be <strong>SHA1<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/x5eGKoBDkGOl5UGRgk1oxSx0j55B0VCp1s5vRNKWFl4uflsFnJFRi2Oqs6nq3UVJbJTaM89htTNJf6wRXmOZIA86pAWw5CUASi9Qrc520vUKtwML1CH9MXjMtcaX2Iwy_WvxLklQS9ISNGdHU980a5X9qUIVY10qskPpou9IRpDz4pDXho_esqy-YQ\" alt=\"Orcus RAT is using PasswordDeriveBytes class with the default constructor\" width=\"972\" height=\"55\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Are you wondering how it\u2019s done? Here is a scenario:&nbsp;<\/p>\n\n\n\n<p>The first 20 bytes proceed as usual, then a byte counter is added to each hashed byte of the inherited string from the 20th to the last byte. Taking it into account, we implemented this in Python:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/tSBsRub8NwC1522hMQ4czmYtlntuRgK_UBISqXhEpsaLFZSTe7QUi6Ko02bkPPLcm3hkNZ_GHTysIPiAaHKbvajJceG8Y5XvO9CFlfAWl0YF4AasFhqkn-LkEayxowdZVxqpb3DWxE_BHQqotwviF-TwvTdfqXtlJ-Yz9w2IXjE-hIU_wvkLWwEKzg\" alt=\"Microsoft\u2019s extended PBKDF1 algorithm implemented in Python\n\"\/><\/figure>\n\n\n\n<p>Knowing the correct key, you can decrypt the data using<a href=\"https:\/\/gchq.github.io\/CyberChef\/#recipe=From_Base64('A-Za-z0-9%2B\/%3D',true,false)AES_Decrypt(%7B'option':'Hex','string':'415434738C1FFA7635528C8D77E07A8544F7808912652F07E2C2C88A8BB4B596'%7D,%7B'option':'UTF8','string':'0sjufcjbsoyzube6'%7D,'CBC','Raw','Raw',%7B'option':'Hex','string':''%7D,%7B'option':'Hex','string':''%7D)&amp;input=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\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> CyberChef<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/QCv_BX-wfuay74coAG2KtoKUV_fSbYInKTaWpNzHTK-KMnPblzBMb_lN8AbKkqcq1Q3vAxFKll4ZRG5Yx01J4E_dxb1kFBlGwsFNnAXAuGH2x2Kpd8rKzUNZjR8zWp4BS9Mt3e2eulvAIvO_pmDckPLi-RZbrT835cjH2iMCrnHWG3lVgj2N10HT1Q\" alt=\"Orcus configuration decrypted in CyberChef\n\"\/><\/figure>\n\n\n\n<p>As a result of decoding, we get the malware configuration in the XML format.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/g1dNqJYz826J_oOK76i16-QkDkPRVEMd1fbbGUFHBbKoN1Qp95kmTSXlsF-PQNNW4lrWg4FVbwBlfmHnG4N_HDDRiH9JxVd8KCPdrZepOoLqtnoNeMVT1rOvatUMA-i82Mp6vbP9Esevetf_S2FtE1zr8xBWqU21gvWGAQAtVEz8bsGijiO6FJgwog\" alt=\"Example of C2s properties in the decrypted XML config\" width=\"839\" height=\"802\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Automating the configuration extraction process of Orcus RAT<\/h3>\n\n\n\n<p>Now, we will write a Python script with the necessary data to decrypt and automate the configuration extraction. After studying some samples, we have seen that the strings with the encrypted data are located one after another in the UserString stream between two other specific UserString objects (the strings &#8220;case FromAdministrationPackage.GetScreen&#8221; and &#8220;klg_&#8221;).<\/p>\n\n\n\n<p>Next, using the <strong>dnfile<\/strong> library, we implement a simple algorithm that iterates through the UserStrings looking for the strings mentioned above. And it\u2019s important to note that the number of received strings between them must be three:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The main encrypted configuration of malware&nbsp;<\/li>\n\n\n\n<li>The encrypted configuration of the plugins that Orcus uses<\/li>\n\n\n\n<li>The key from which the AES key will be generated&nbsp;<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/jeiTJG8CJZE7ErgyITvjqZRTMz7UMJVcgXqOqVBzI25AilIiDFl4N_y6Tzx3gwhpOIWzSl5EqwAtejYOWEbmO18t9OJ-WfG3h5u_ZHNwoXp1h7oT4XGDuEOafX0haNjh6yfP2ZR5qkWEqBIebOgGWXe2MfCFQ6K9CNUKI5mNdo4kROOzRt-LltFqCQ\" alt=\"Encrypted data extraction algorithm written in Python\n\" width=\"829\" height=\"690\"\/><\/figure>\n\n\n\n<p>You can also always use<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=landing\" target=\"_blank\"> ANY.RUN service<\/a> to automatically retrieve the Orcus RAT configuration. It\u2019s a much easier way to analyze a malicious object in a short period of time. For example, the sandbox has already retrieved all data from this <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/55dce88d-b52c-4a51-b3c8-b8e6dcff0b13?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=task\" target=\"_blank\">Orcus sample<\/a>, so you can enjoy smooth research.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/-wqJfjTNEoahwZ6VPRutEyBfGYIxQTJTze9qa9Qd4Uj_UaATv73vqLgiGzFNqAvTenWTKWywqy3rmFGZvMomOkPQoN-c-ZgciM2k6vg06kO700K2-dxxJSILkA2eRwDoORKNXsaKfklNyom_5eCSysiKbh9JUnApEJlx0w05OE5wFEUc0fwjP58YTQ\" alt=\"Decrypted Orcus RAT configuration shown in ANY.RUN interactive sandbox\n\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>In this article, we briefly analyzed the Orcus RAT and automated its configuration extraction. The<a href=\"https:\/\/github.com\/anyrun\/blog-scripts\/blob\/main\/Extractors\/OrcusRat\/OrcusRat.py?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=orcus&amp;utm_content=script\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> full version of the extractor<\/a> is available at the link, so don\u2019t forget to check it out!&nbsp;<br><\/p>\n\n\n\n<p>Orcus has become another chapter in our malware analysis series. Read our previous posts about <a href=\"https:\/\/any.run\/cybersecurity-blog\/strrat-malware-analysis-of-a-jar-archive\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">STRRAT<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/raccoon-stealer-v2-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Raccoon Stealer<\/a>. What should we cover next?<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The post blitz survey&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is Orcus RAT?<\/li>\n<\/ul>\n\n\n\n<p>Orcus is a Remote Access Trojan that allows attackers to create plugins and offers a robust core feature.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Where and how does Orcus store additional assemblies?&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Orcus RAT stores additional assemblies inside the the malware resources using a &#8216;deflate&#8217; algorithm.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How does Orcus encrypt data?&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Orcus RAT encrypts data using the AES algorithm and then encodes encrypted data using Base64.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How can we decrypt Orcus RAT?<\/li>\n<\/ul>\n\n\n\n<p>First, you need to generate the key from a given string using Microsoft&#8217;s PBKDF1 implementation. Second, decode the data from Base64. Finally, apply the generated key to decrypt the data via the AES256 algorithm in CBC mode. As a result of decoding, we get the malware configuration in the XML format.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our malware analysts are always on the lookout for and researching various malicious samples. This time we came across Orcus RAT in ANY.RUN online malware sandbox and decided to perform a technical malware analysis. In this article, you will learn how this RAT stores and protects its configuration and how to write the memory dump [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[34],"class_list":["post-3978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Orcus RAT Technical Malware Analysis and Configuration Extraction<\/title>\n<meta name=\"description\" content=\"Are you looking for Orcus RAT malware analysis? Read how it stores and protects configuration and how to write the memory dump extractor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hardee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\"},\"author\":{\"name\":\"hardee\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"What is Orcus RAT? Technical Analysis and Malware Configuration\",\"datePublished\":\"2022-11-03T06:00:36+00:00\",\"dateModified\":\"2023-03-27T13:57:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\"},\"wordCount\":1118,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\",\"name\":\"Orcus RAT Technical Malware Analysis and Configuration Extraction\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-11-03T06:00:36+00:00\",\"dateModified\":\"2023-03-27T13:57:30+00:00\",\"description\":\"Are you looking for Orcus RAT malware analysis? Read how it stores and protects configuration and how to write the memory dump extractor.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Orcus RAT? Technical Analysis and Malware Configuration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"hardee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-11.png\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-11.png\",\"caption\":\"hardee\"},\"description\":\"I contribute to open source from time to time and I am always up for a challenge.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Orcus RAT Technical Malware Analysis and Configuration Extraction","description":"Are you looking for Orcus RAT malware analysis? Read how it stores and protects configuration and how to write the memory dump extractor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/","twitter_misc":{"Written by":"hardee","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/"},"author":{"name":"hardee","@id":"https:\/\/any.run\/"},"headline":"What is Orcus RAT? Technical Analysis and Malware Configuration","datePublished":"2022-11-03T06:00:36+00:00","dateModified":"2023-03-27T13:57:30+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/"},"wordCount":1118,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/","name":"Orcus RAT Technical Malware Analysis and Configuration Extraction","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-11-03T06:00:36+00:00","dateModified":"2023-03-27T13:57:30+00:00","description":"Are you looking for Orcus RAT malware analysis? Read how it stores and protects configuration and how to write the memory dump extractor.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/orcus-rat-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"What is Orcus RAT? Technical Analysis and Malware Configuration"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"hardee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-11.png","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-11.png","caption":"hardee"},"description":"I contribute to open source from time to time and I am always up for a challenge.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3978"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=3978"}],"version-history":[{"count":10,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3978\/revisions"}],"predecessor-version":[{"id":4616,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/3978\/revisions\/4616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3986"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=3978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=3978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=3978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}