General

  • Target

    迪拜女推广分享自己的引流话术全套.zip

  • Size

    436KB

  • Sample

    210922-zycgzsdhe2

  • MD5

    090c96fc363153255f5fc3996522df3c

  • SHA1

    0ead2f0785f5650dd62a709110f21db16a404460

  • SHA256

    0c7d3b3bb30dd430323c16e6197ad7d99d0e6e730c513f0da4da5bf0dbde35af

  • SHA512

    7c3aa9b087eee6a871908578a2256a18a8ec6b84574a49248ad4fb275c0e16e50f21a311640588a9288e875d3c7cb54b10171d9f92f2c67a14bbc7417963f792

Malware Config

Targets

    • Target

      ????????????????.cmd

    • Size

      1.2MB

    • MD5

      57523bab2ccf571fcecc172ea5f44959

    • SHA1

      b214a6cc13e5022779b6ecaf0364a0464defa4ca

    • SHA256

      ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b

    • SHA512

      197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks