General
-
Target
tmp/xp.exe
-
Size
1.3MB
-
Sample
211215-jn54jsghh3
-
MD5
80526cfb4316313ed339ca64368f5fae
-
SHA1
96507bec2754a51dca329bb73e2b2c56ce73e269
-
SHA256
9aa1748979696921b27868393bbb69add33c1dbc89624ea3085119aaf76cc2e7
-
SHA512
38155a4b8713e78c737108a1c6ff119b06832121d789bec0ced3f7fa140c07d6478c320a4f5fa97834a1ec67b7bb1d7ec8c890fd0934b7bc5c5fbc3f27e037d3
Static task
static1
Behavioral task
behavioral1
Sample
tmp/xp.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
tmp/xp.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
tmp/xp.exe
-
Size
1.3MB
-
MD5
80526cfb4316313ed339ca64368f5fae
-
SHA1
96507bec2754a51dca329bb73e2b2c56ce73e269
-
SHA256
9aa1748979696921b27868393bbb69add33c1dbc89624ea3085119aaf76cc2e7
-
SHA512
38155a4b8713e78c737108a1c6ff119b06832121d789bec0ced3f7fa140c07d6478c320a4f5fa97834a1ec67b7bb1d7ec8c890fd0934b7bc5c5fbc3f27e037d3
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-