General

  • Target

    fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1

  • Size

    4.2MB

  • Sample

    220525-b9vwpsahcq

  • MD5

    a97298f5d70fd3eb9c46bc5bb14b6cd6

  • SHA1

    7fd6fe0c946ca25386c0402efa6d43f545193b6a

  • SHA256

    fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1

  • SHA512

    2c4ee94382590a7a5427dd7c462767e6d6c5c38f379e181a13b1e300c5869f171722519f37eed095efa80449b738e0892fe01be3c38b695380ac86b8d5b2b10f

Malware Config

Targets

    • Target

      fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1

    • Size

      4.2MB

    • MD5

      a97298f5d70fd3eb9c46bc5bb14b6cd6

    • SHA1

      7fd6fe0c946ca25386c0402efa6d43f545193b6a

    • SHA256

      fe0c0b0b671cccf510ee1075e6c73ad61f24ab8390ca608916861eb6385a6eb1

    • SHA512

      2c4ee94382590a7a5427dd7c462767e6d6c5c38f379e181a13b1e300c5869f171722519f37eed095efa80449b738e0892fe01be3c38b695380ac86b8d5b2b10f

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks