General
-
Target
迪拜女推广分享自己的引流话术全套.zip
-
Size
436KB
-
Sample
210922-zycgzsdhe2
-
MD5
090c96fc363153255f5fc3996522df3c
-
SHA1
0ead2f0785f5650dd62a709110f21db16a404460
-
SHA256
0c7d3b3bb30dd430323c16e6197ad7d99d0e6e730c513f0da4da5bf0dbde35af
-
SHA512
7c3aa9b087eee6a871908578a2256a18a8ec6b84574a49248ad4fb275c0e16e50f21a311640588a9288e875d3c7cb54b10171d9f92f2c67a14bbc7417963f792
Static task
static1
Behavioral task
behavioral1
Sample
????????????????.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
????????????????.cmd.exe
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
????????????????.cmd
-
Size
1.2MB
-
MD5
57523bab2ccf571fcecc172ea5f44959
-
SHA1
b214a6cc13e5022779b6ecaf0364a0464defa4ca
-
SHA256
ce2b941076f27243a2ef984e5d6b045c505a98bc73a5a3b1152112228079e68b
-
SHA512
197da439cac7e8eb38e60f4be9f832ac91d9b88cc5021ac9036822f87dfb9cb8c72171bceb7b1e5034074ae5de0cb40e2d60c3d73f9820cbd73c4ffeac0ae979
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-