General
-
Target
迪拜女狗推被轮奸暴打视频Mp4.zip
-
Size
706KB
-
Sample
210922-zycgzsgebn
-
MD5
2619e57a4c38db50f1c0d77d0db7dff2
-
SHA1
c00024f387cb3db2c42e5c01e6dc039b57c30e9f
-
SHA256
e95c6dcfbb6721aacac7a99d3c8a3b86c2114c9914fd78c344d6fcdc535bb4b8
-
SHA512
3e958d9d5bf215e72d718ee0f9ff98f9e042147df5723c08eae7c0718e2a34f184ef39f087ddf9c9b81ba2bafe86f1989cddcfd7cc1e6ad4cc9d2653ba24d9a5
Static task
static1
Behavioral task
behavioral1
Sample
????????????Mp4.cmd.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
????????????Mp4.cmd.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
????????????Mp4.cmd
-
Size
1.8MB
-
MD5
61a6445842bfd501f8e8c63a18e899cd
-
SHA1
5c2c9e20f5607534128265bbbd03794be01e9e1d
-
SHA256
ec694d5b05f7aa43e3e701e40686039a38d6827e5e944ba73de07f31da18d608
-
SHA512
96a7f74e40b391c3a06a3da4a4b026862f13493f4307073e24e426046015db5b993de536c709f014c69474117442614dc53ec70efe039520723801374dedb8d9
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-