General

  • Target

    tmp

  • Size

    1.5MB

  • Sample

    230116-pgrkgaeg86

  • MD5

    90ec6306c82c23bc93301410e61d2461

  • SHA1

    e50b0625f4ec6598516c0a5e98bbc2d6dd0aa327

  • SHA256

    1c78dfb017659c303502c97118fa9d2a6d8dcd02024350219a8ac4c4342dbbe4

  • SHA512

    e13a680612ebc84081e91716188230dd050e3e28dfd206d2236cd4d9c48bf9ccb00294a133f31f2837f1f85fe1e16a95e8f2801e6fa5b9558cf233cac39c88a4

  • SSDEEP

    24576:FgChBvFvfSyOllGZ2O/F77tBPHGztHGxzgSJUypu4tHqZIYdAuE8kNZTdYjW:FgIvFCHHGPHGN0gqQwxY+V1iS

Malware Config

Targets

    • Target

      tmp

    • Size

      1.5MB

    • MD5

      90ec6306c82c23bc93301410e61d2461

    • SHA1

      e50b0625f4ec6598516c0a5e98bbc2d6dd0aa327

    • SHA256

      1c78dfb017659c303502c97118fa9d2a6d8dcd02024350219a8ac4c4342dbbe4

    • SHA512

      e13a680612ebc84081e91716188230dd050e3e28dfd206d2236cd4d9c48bf9ccb00294a133f31f2837f1f85fe1e16a95e8f2801e6fa5b9558cf233cac39c88a4

    • SSDEEP

      24576:FgChBvFvfSyOllGZ2O/F77tBPHGztHGxzgSJUypu4tHqZIYdAuE8kNZTdYjW:FgIvFCHHGPHGN0gqQwxY+V1iS

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks