General

  • Target

    82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955

  • Size

    564KB

  • Sample

    220319-qxzfpabag5

  • MD5

    967d07a54d49ef152a1f0948b7962402

  • SHA1

    0f29866f65465247e5b1e90ccd4c743f5907d028

  • SHA256

    82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955

  • SHA512

    bbf948180c9a1f03bd50e308210cff8fd42256ee1c412fdd04fe12f71391cc739d747e4e0e4073b9c1c809468130ff87fa63803beaabbcda8ef5db00fe85b2a7

Malware Config

Targets

    • Target

      82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955

    • Size

      564KB

    • MD5

      967d07a54d49ef152a1f0948b7962402

    • SHA1

      0f29866f65465247e5b1e90ccd4c743f5907d028

    • SHA256

      82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955

    • SHA512

      bbf948180c9a1f03bd50e308210cff8fd42256ee1c412fdd04fe12f71391cc739d747e4e0e4073b9c1c809468130ff87fa63803beaabbcda8ef5db00fe85b2a7

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks