General

  • Target

    迪拜女狗推被轮奸暴打视频Mp4.zip

  • Size

    706KB

  • Sample

    210922-zycgzsgebn

  • MD5

    2619e57a4c38db50f1c0d77d0db7dff2

  • SHA1

    c00024f387cb3db2c42e5c01e6dc039b57c30e9f

  • SHA256

    e95c6dcfbb6721aacac7a99d3c8a3b86c2114c9914fd78c344d6fcdc535bb4b8

  • SHA512

    3e958d9d5bf215e72d718ee0f9ff98f9e042147df5723c08eae7c0718e2a34f184ef39f087ddf9c9b81ba2bafe86f1989cddcfd7cc1e6ad4cc9d2653ba24d9a5

Malware Config

Targets

    • Target

      ????????????Mp4.cmd

    • Size

      1.8MB

    • MD5

      61a6445842bfd501f8e8c63a18e899cd

    • SHA1

      5c2c9e20f5607534128265bbbd03794be01e9e1d

    • SHA256

      ec694d5b05f7aa43e3e701e40686039a38d6827e5e944ba73de07f31da18d608

    • SHA512

      96a7f74e40b391c3a06a3da4a4b026862f13493f4307073e24e426046015db5b993de536c709f014c69474117442614dc53ec70efe039520723801374dedb8d9

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks