Orz

Malware updated 6 months ago (2024-05-04T21:17:58.583Z)
Download STIX
Preview STIX
Orz is a malicious software (malware) known for its detrimental capabilities to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user, and can steal personal information, disrupt operations, or hold data hostage for ransom. The malware has been utilized by cyber actors since 2014, primarily as a backdoor for decrypting and executing another JavaScript backdoor. Some versions of the Orz backdoor contain embedded 32- and 64-bit DLLs, stored internally as base64 strings. These DLLs are used for decrypting and executing the final JavaScript backdoor “Orz”. The Orz malware communicates with its command and control (CnC) servers, allowing it to send passwords and other sensitive information back to the attackers. This communication was observed in the ETPRO TROJAN Orz JavaScript Backdoor activities, with specific identifiers being 2828317 and 2828316. In addition, a secondary C2 was identified in December 2014, further emphasizing the long-standing use of this malware. A snippet of the Orz backdoor code was also found delivered by a Microsoft Publisher document, demonstrating one of the various infiltration techniques employed. Orz is part of a larger set of tools used by TEMP.Periscope, a group suspected of Chinese origin, which includes other malware like AIRBREAK, Cobalt Strike, the SeDll JavaScript loader, and MockDll dll loader. TEMP.Periscope shares significant overlaps in targeting, tactics, techniques, and procedures (TTPs) with TEMP.Jumper, a group that also overlaps significantly with public reporting on “NanHaiShu.” In recent activities, TEMP.Periscope has leveraged a relatively large library of shared malware, including Orz, indicating a coordinated and sophisticated threat landscape.
Description last updated: 2024-05-04T20:46:07.404Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Orz Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more