General

  • Target

    Sr.exe

  • Size

    1.0MB

  • Sample

    221015-b7nplsfafn

  • MD5

    6f4fc9a2f722fb24d5944c3720c8e086

  • SHA1

    47b9064ae4db4974776bf8bd1bba8840b77124d2

  • SHA256

    d7420275fec10fe9b857d9a7688e50e86534f0aab151c5e766fc74833f34e478

  • SHA512

    6e3c4ebc7738115862e935b7cb18271969df1b2d54b49415d2500294b6391fb8f0dad0fe18bbeb69b865ecb40478ecad9c46e7b65c443e6445047164cf82f9e2

  • SSDEEP

    6144:3yq9ptgIsxITrY0jTxx7B+G9gZ6Ae2y8Uk:vxgIsxITrLjlx7B+BZR2

Malware Config

Targets

    • Target

      Sr.exe

    • Size

      1.0MB

    • MD5

      6f4fc9a2f722fb24d5944c3720c8e086

    • SHA1

      47b9064ae4db4974776bf8bd1bba8840b77124d2

    • SHA256

      d7420275fec10fe9b857d9a7688e50e86534f0aab151c5e766fc74833f34e478

    • SHA512

      6e3c4ebc7738115862e935b7cb18271969df1b2d54b49415d2500294b6391fb8f0dad0fe18bbeb69b865ecb40478ecad9c46e7b65c443e6445047164cf82f9e2

    • SSDEEP

      6144:3yq9ptgIsxITrY0jTxx7B+G9gZ6Ae2y8Uk:vxgIsxITrLjlx7B+BZR2

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks