General

  • Target

    “00”后大学生职场遭遇变态上司强奸视频.cmd

  • Size

    1.2MB

  • Sample

    210922-a7g2dsagh9

  • MD5

    57523bab2ccf571fcecc172ea5f44959

  • SHA1

    b214a6cc13e5022779b6ecaf0364a0464defa4ca

  • SHA256

    ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b

  • SHA512

    197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979

Malware Config

Targets

    • Target

      “00”后大学生职场遭遇变态上司强奸视频.cmd

    • Size

      1.2MB

    • MD5

      57523bab2ccf571fcecc172ea5f44959

    • SHA1

      b214a6cc13e5022779b6ecaf0364a0464defa4ca

    • SHA256

      ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b

    • SHA512

      197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks