General

  • Target

    GoldenSpy (10)

  • Size

    4.3MB

  • Sample

    200702-4gxmmwxrln

  • MD5

    f27d1590ba0aaad5d3c0831cf3e33df6

  • SHA1

    282cc1f9cfec1ae9d07a8a6add327977f405244f

  • SHA256

    4f86175e5500be87cc95ea9fcaf565970e15a86b2aa3223f8ef8d25e72cec376

  • SHA512

    a65078a14ae14c417d4db497e220e1fcbd29e76bcc971fd7ff5f560498be1d717622def506df8e7782b8501c6defe356befa80e6769873124a65e93368d09061

Malware Config

Targets

    • Target

      GoldenSpy (10)

    • Size

      4.3MB

    • MD5

      f27d1590ba0aaad5d3c0831cf3e33df6

    • SHA1

      282cc1f9cfec1ae9d07a8a6add327977f405244f

    • SHA256

      4f86175e5500be87cc95ea9fcaf565970e15a86b2aa3223f8ef8d25e72cec376

    • SHA512

      a65078a14ae14c417d4db497e220e1fcbd29e76bcc971fd7ff5f560498be1d717622def506df8e7782b8501c6defe356befa80e6769873124a65e93368d09061

    • GoldenSpy

      Backdoor spotted in June 2020 being distributed with the Chinese "Intelligent Tax" software.

    • GoldenSpy Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks