General
-
Target
“00”后大学生职场遭遇变态上司强奸视频.cmd
-
Size
1.2MB
-
Sample
210922-a7g2dsagh9
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Static task
static1
Behavioral task
behavioral1
Sample
“00”后大学生职场遭遇变态上司强奸视频.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
“00”后大学生职场遭遇变态上司强奸视频.cmd.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
“00”后大学生职场遭遇变态上司强奸视频.cmd
-
Size
1.2MB
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-