General
-
Target
225e843400c12b6cbd6bc90519acb854753621b30c62f3b714b4c72d13986623
-
Size
650KB
-
Sample
220130-hwt6ksgfhl
-
MD5
9e6ba6dafb056951f248f895c7b19754
-
SHA1
e2486e5b7f82381774d0ef3de85fedcd502938ed
-
SHA256
225e843400c12b6cbd6bc90519acb854753621b30c62f3b714b4c72d13986623
-
SHA512
0f027ca25c4d53c04f1b530812b6c976eb3d62e3ac4fdd348cf2a45449fe5685c793d83b4b0b3421520abea03038b3332ce48b99ef34348dd92f6dc6127998e1
Static task
static1
Behavioral task
behavioral1
Sample
2名高三女学生酒吧被下药,被带到酒店进行疯狂性虐待、各种姿势爆操视频.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2名高三女学生酒吧被下药,被带到酒店进行疯狂性虐待、各种姿势爆操视频.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
2名高三女学生酒吧被下药,被带到酒店进行疯狂性虐待、各种姿势爆操视频.com
-
Size
2.1MB
-
MD5
a8a2233b38793d77203a29fee7288bc8
-
SHA1
bab33409a0ae5b3a203d2c07a1294a086e65444b
-
SHA256
8aa0c0d3d0fbb72a3f19886f93efcdfe2438880294c627eeb1f295097e67cf58
-
SHA512
cfa6f107e5c666dfb418bf0275f80b17c0ed696fcfa121a743d4a743f3282fe41623a4cffc2652a4260aaf87763823a56028b6953f5fb80c249c0af616a36c8a
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-