General

  • Target

    tmp

  • Size

    636KB

  • Sample

    220923-qjy8rsaccl

  • MD5

    d78e432596860d422a790aaeb88656d1

  • SHA1

    501d5a13d4a2b1e1c96cda905be18472c46a7f74

  • SHA256

    889b8e0b10272ec7328892a98d78ad017f6f55740fab6e89fda86b776cd31c03

  • SHA512

    de6e05961a3056afdf96fc81f133574e249ccc3e50a417413424bbef349cb185372a4f076adff4e3c896e1e43e818aecbf7c284cf3212c6ab2923956b16bc827

Malware Config

Targets

    • Target

      tmp

    • Size

      636KB

    • MD5

      d78e432596860d422a790aaeb88656d1

    • SHA1

      501d5a13d4a2b1e1c96cda905be18472c46a7f74

    • SHA256

      889b8e0b10272ec7328892a98d78ad017f6f55740fab6e89fda86b776cd31c03

    • SHA512

      de6e05961a3056afdf96fc81f133574e249ccc3e50a417413424bbef349cb185372a4f076adff4e3c896e1e43e818aecbf7c284cf3212c6ab2923956b16bc827

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation