General
-
Target
迪拜女狗推被轮奸暴打视频MV (2).zip
-
Size
436KB
-
Sample
210922-ztcbesgeak
-
MD5
043b216471565a2ffc680255c52930a6
-
SHA1
4f5e2e597d8a0c9ce910897b7d2a52aa87f3dd65
-
SHA256
67dc6d5433dccd9199d12ae66933a82450b06a83a753bb8eecffb63d20f30bb0
-
SHA512
55e6bbd46a71f704b0fe667e535ed674a70e821d04d374eac9426ec47c2a4a50bd4e0262d19ea46b9e83dc513caef336e9787f3a2d2e2bc1a0534d55690b9b74
Static task
static1
Behavioral task
behavioral1
Sample
????????????MV.cmd.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
????????????MV.cmd.exe
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
????????????MV.cmd
-
Size
1.2MB
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-