General

  • Target

    a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a

  • Size

    3.5MB

  • Sample

    220524-1tnj5ahdb8

  • MD5

    9c2be565965857100e3aa9ae6aaf4dd3

  • SHA1

    983b916aca832e67dbb7e04a705646ca92ce92ee

  • SHA256

    a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a

  • SHA512

    3384c625822c0d338c76f3fc01de42468fd1a4eb85e39769e309040caebd5214f3eabcbbc156d074ce2284dc33412572f43e7db9bcb1c911789268e4e6ba33eb

Malware Config

Targets

    • Target

      a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a

    • Size

      3.5MB

    • MD5

      9c2be565965857100e3aa9ae6aaf4dd3

    • SHA1

      983b916aca832e67dbb7e04a705646ca92ce92ee

    • SHA256

      a59f6414b9d01c85e750fec09c8986d1f3a729bd936ea41639faa4c3d516565a

    • SHA512

      3384c625822c0d338c76f3fc01de42468fd1a4eb85e39769e309040caebd5214f3eabcbbc156d074ce2284dc33412572f43e7db9bcb1c911789268e4e6ba33eb

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Chinese Botnet Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks