General

  • Target

    迪拜女狗推被轮奸暴打视频MV.zip

  • Size

    844KB

  • Sample

    210922-zsrdysgdhr

  • MD5

    255621fa5b329e005a5b6fd09b042483

  • SHA1

    16d0a5bc07e2ae96c95d54fb7253e6675e30a89a

  • SHA256

    4fbe5e544538a5b4e9d1af00ddfd28b14e7a41c927a1f44997d38204d9768669

  • SHA512

    5936ce512742bc3cefe44b879102d6c7272c150bf0e2f7502a87c472b49f9488dbf80e3cb0426be8892793a3198275bde6bad664f2b14ae78cc2b793bdd45be6

Malware Config

Targets

    • Target

      ????????????MV.cmd

    • Size

      2.0MB

    • MD5

      0889ac4ebfcc906fa3dc17f3a97862da

    • SHA1

      dcf4239b4535a3bc4a2a83fadab113984421d086

    • SHA256

      07ebb19e273995bef00aa19ad538b5cacb5eb0527288c3f5a31be66bfc1d9bb9

    • SHA512

      419d4c89cd9607e2140b0f1eb49c47ed2a0998d40777914bf5b443e5c6906da875407f769b286da390b36f19fcdd9411dd0b6583e3513d1460d3e11533e45bf3

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks