General

  • Target

    tmp

  • Size

    1.1MB

  • Sample

    220812-plyvcadbal

  • MD5

    597743cae38ea6db5ebd4ad1b86bd4a2

  • SHA1

    e85fe9fbdf7a231e84cf05de5bb83d2365870ee7

  • SHA256

    cbe1d135aa581351521ac9bef584775381fdf782925952e0df2e84297afbc463

  • SHA512

    5779f16139bd6bab6647157161b1b0aefca4f2d12a784db93cddb938786823b1482d1253e1faa9a683503b32eba6e9c6d472f867f090cc1f37bba5cd35eb8d8e

Malware Config

Targets

    • Target

      tmp

    • Size

      1.1MB

    • MD5

      597743cae38ea6db5ebd4ad1b86bd4a2

    • SHA1

      e85fe9fbdf7a231e84cf05de5bb83d2365870ee7

    • SHA256

      cbe1d135aa581351521ac9bef584775381fdf782925952e0df2e84297afbc463

    • SHA512

      5779f16139bd6bab6647157161b1b0aefca4f2d12a784db93cddb938786823b1482d1253e1faa9a683503b32eba6e9c6d472f867f090cc1f37bba5cd35eb8d8e

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Chinese Botnet payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks