General

  • Target

    4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c

  • Size

    564KB

  • Sample

    220320-b4ktjsecd8

  • MD5

    6fb8c809e635fbc46adad84e9c78415a

  • SHA1

    f884cc366990915da0d9681d73622070f616bc39

  • SHA256

    4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c

  • SHA512

    b07c94fe006f65bc984cce1d55d217a1beadc97d5554365f81e91143b3901436308e4e2b57f772e6c554124ba1b3e46e0d7c9ae2db678478f2b8478653a67eb3

Malware Config

Targets

    • Target

      4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c

    • Size

      564KB

    • MD5

      6fb8c809e635fbc46adad84e9c78415a

    • SHA1

      f884cc366990915da0d9681d73622070f616bc39

    • SHA256

      4c0a663f8e4ef5bf257dbf1f38174a74828151382d1d9918d629fbae04263a0c

    • SHA512

      b07c94fe006f65bc984cce1d55d217a1beadc97d5554365f81e91143b3901436308e4e2b57f772e6c554124ba1b3e46e0d7c9ae2db678478f2b8478653a67eb3

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks