Orcus RAT

Description

(Morphisec) In a successful attack, the Orcus RAT can steal browser cookies and passwords, launch server stress tests (DDoS attacks), disable the webcam activity light, record microphone input, spoof file extensions, log keystrokes and more.

The Orcus RAT masquerades as a legitimate remote administration tool, although it is clear from its features and functionality that it is not and was never intended to be. (Brian Krebs published an interesting expose on the man behind the supposed administration tool.) Until two weeks ago, it was publicly sold and licensed by a company calling itself Orcus Technologies. The project is now closed, according to this “press release” issued, and a license-free version available for download, as well as software development tools and documentation. Interestingly, the author also claims there is a “kill switch” available for download by security researchers to remotely shut down and lock out any Orcus control server that they find are being used for malicious purposes.

Names

Name
Orcus RAT
Orcus
Schnorchel

Category

Malware

Type

  • Backdoor
  • Keylogger
  • Credential stealer
  • Info stealer
  • DDoS

Information

Malpedia

Alienvault Otx

Other Information

Uuid

9c969fa3-3382-4713-901d-a864b6c55549

Last Card Change

2023-02-15