General

  • Target

    225e843400c12b6cbd6bc90519acb854753621b30c62f3b714b4c72d13986623

  • Size

    650KB

  • Sample

    220130-hwt6ksgfhl

  • MD5

    9e6ba6dafb056951f248f895c7b19754

  • SHA1

    e2486e5b7f82381774d0ef3de85fedcd502938ed

  • SHA256

    225e843400c12b6cbd6bc90519acb854753621b30c62f3b714b4c72d13986623

  • SHA512

    0f027ca25c4d53c04f1b530812b6c976eb3d62e3ac4fdd348cf2a45449fe5685c793d83b4b0b3421520abea03038b3332ce48b99ef34348dd92f6dc6127998e1

Malware Config

Targets

    • Target

      2名高三女学生酒吧被下药,被带到酒店进行疯狂性虐待、各种姿势爆操视频.com

    • Size

      2.1MB

    • MD5

      a8a2233b38793d77203a29fee7288bc8

    • SHA1

      bab33409a0ae5b3a203d2c07a1294a086e65444b

    • SHA256

      8aa0c0d3d0fbb72a3f19886f93efcdfe2438880294c627eeb1f295097e67cf58

    • SHA512

      cfa6f107e5c666dfb418bf0275f80b17c0ed696fcfa121a743d4a743f3282fe41623a4cffc2652a4260aaf87763823a56028b6953f5fb80c249c0af616a36c8a

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks