Backdoor

What is “Backdoor.RAT.MSIL.Orcus”?

Malware Removal

The Backdoor.RAT.MSIL.Orcus is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.RAT.MSIL.Orcus virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • .NET file is packed/obfuscated with SmartAssembly
  • Authenticode signature is invalid
  • Anomalous .NET characteristics
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Created a process from a suspicious location
  • Collects and encrypts information about the computer likely to send to C2 server
  • Detects OrcusRAT Behavior
  • CAPE detected the OrcusRAT malware family
  • Attempts to masquerade or mimic a legitimate process or file name
  • Uses csc.exe C# compiler to build and execute code
  • Uses suspicious command line tools or Windows utilities

Related domains:

wpad.local-net

How to determine Backdoor.RAT.MSIL.Orcus?


File Info:

name: 4D6EE916502D64004F5F.mlw
path: /opt/CAPEv2/storage/binaries/19d3b6953a292f714689c66ea44c84bebfcb6a176dc0025a0becebefb80f558a
crc32: 9ACB79AE
md5: 4d6ee916502d64004f5ff45e434d5323
sha1: 39d92eab7a7d5bcf19063b338e63b02d98c4fb6e
sha256: 19d3b6953a292f714689c66ea44c84bebfcb6a176dc0025a0becebefb80f558a
sha512: a4f696f70535b709d7fc35b22784e59e1b421e02df057145d6db49d4a1cc2684e5704c1c657923031220a33cd26c06541d84c8e38351ec878993dab587e324ab
ssdeep: 24576:cy8LwNOPa5kOvLmhNITdN3XXKqZkA8gsPB:ctLwN5nKhN8dN3nxZHsp
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17345F0E1B748CD62C46B4679903BD6532723AA0D8D1AD60E3CC5BF5E3DA638B041788F
sha3_384: 60a18d7949025cd1da32018c3916f90d0cd08653e28b66d04f42c25f0d3e1082f2240522e07ca4cb670199be9c3533ba
ep_bytes: ff250020400000000000000000000000
timestamp: 2019-04-08 18:22:06

Version Info:

Translation: 0x0000 0x04b0
FileDescription:
FileVersion: 0.0.0.0
InternalName: s01v1.exe
LegalCopyright:
OriginalFilename: s01v1.exe
ProductVersion: 0.0.0.0
Assembly Version: 0.0.0.0

Backdoor.RAT.MSIL.Orcus also known as:

Elasticmalicious (high confidence)
ClamAVWin.Packed.Razy-6849099-0
ALYacBackdoor.RAT.MSIL.Orcus
ZillyaTrojan.Generic.Win32.741507
K7AntiVirusTrojan ( 005486a91 )
BitDefenderIL:Trojan.MSILZilla.5040
K7GWTrojan ( 005486a91 )
Cybereasonmalicious.6502d6
ArcabitIL:Trojan.MSILZilla.D13B0
CyrenW32/MSIL_Kryptik.GC.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/TrojanDropper.Agent.EEB
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.MSIL.Generic
AlibabaTrojan:MSIL/CryptInject.e5d324d8
NANO-AntivirusTrojan.Win32.Bladabindi.foxnsv
SUPERAntiSpywareTrojan.Agent/Gen-Injector
MicroWorld-eScanIL:Trojan.MSILZilla.5040
TencentWin32.Trojan.Inject.Auto
Ad-AwareIL:Trojan.MSILZilla.5040
EmsisoftIL:Trojan.MSILZilla.5040 (B)
DrWebTrojan.DownLoader25.14206
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FireEyeGeneric.mg.4d6ee916502d6400
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
JiangminTrojan.MSIL.ngbj
AviraTR/Dropper.Gen
MAXmalware (ai score=100)
MicrosoftVirTool:MSIL/CryptInject.YD!MTB
ViRobotTrojan.Win32.Infostealer.1180672
GDataIL:Trojan.MSILZilla.5040
AhnLab-V3Trojan/Win32.Bladabindi.C3143304
McAfeeArtemis!4D6EE916502D
VBA32TScope.Trojan.MSIL
CylanceUnsafe
PandaTrj/GdSda.A
YandexTrojan.Agent!oHYB3V6OGXw
IkarusTrojan-Spy.Agent
eGambitTrojan.Generic
FortinetMSIL/Kryptik.SHS!tr
BitDefenderThetaGen:NN.ZemsilF.34294.ir0@a8FJY5m
AVGWin32:RATX-gen [Trj]
AvastWin32:RATX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
MaxSecureTrojan.Malware.11196064.susgen

How to remove Backdoor.RAT.MSIL.Orcus?

Backdoor.RAT.MSIL.Orcus removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment