General

  • Target

    tmp/xp.exe

  • Size

    1.3MB

  • Sample

    211215-jn54jsghh3

  • MD5

    80526cfb4316313ed339ca64368f5fae

  • SHA1

    96507bec2754a51dca329bb73e2b2c56ce73e269

  • SHA256

    9aa1748979696921b27868393bbb69add33c1dbc89624ea3085119aaf76cc2e7

  • SHA512

    38155a4b8713e78c737108a1c6ff119b06832121d789bec0ced3f7fa140c07d6478c320a4f5fa97834a1ec67b7bb1d7ec8c890fd0934b7bc5c5fbc3f27e037d3

Malware Config

Targets

    • Target

      tmp/xp.exe

    • Size

      1.3MB

    • MD5

      80526cfb4316313ed339ca64368f5fae

    • SHA1

      96507bec2754a51dca329bb73e2b2c56ce73e269

    • SHA256

      9aa1748979696921b27868393bbb69add33c1dbc89624ea3085119aaf76cc2e7

    • SHA512

      38155a4b8713e78c737108a1c6ff119b06832121d789bec0ced3f7fa140c07d6478c320a4f5fa97834a1ec67b7bb1d7ec8c890fd0934b7bc5c5fbc3f27e037d3

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks