General

  • Target

    迪拜女狗推被轮奸暴打视频MV (2).zip

  • Size

    436KB

  • Sample

    210922-ztcbesgeak

  • MD5

    043b216471565a2ffc680255c52930a6

  • SHA1

    4f5e2e597d8a0c9ce910897b7d2a52aa87f3dd65

  • SHA256

    67dc6d5433dccd9199d12ae66933a82450b06a83a753bb8eecffb63d20f30bb0

  • SHA512

    55e6bbd46a71f704b0fe667e535ed674a70e821d04d374eac9426ec47c2a4a50bd4e0262d19ea46b9e83dc513caef336e9787f3a2d2e2bc1a0534d55690b9b74

Malware Config

Targets

    • Target

      ????????????MV.cmd

    • Size

      1.2MB

    • MD5

      57523bab2ccf571fcecc172ea5f44959

    • SHA1

      b214a6cc13e5022779b6ecaf0364a0464defa4ca

    • SHA256

      ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b

    • SHA512

      197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks