General

  • Target

    eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19

  • Size

    2.7MB

  • Sample

    230131-x12tjsbf8v

  • MD5

    1c5db3ef3cac4c9a894c5a1255476b94

  • SHA1

    5c091d5020d23f0a3a3c3f923cfbe9c3f9afc1ff

  • SHA256

    eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19

  • SHA512

    c2e05803fbf225e95a3ee5fb0d8b8d76b704a124bfbd9a6ac90cf300047817ea25e432d9b97ffc9904e88eb41c4d28687ccdc49872cb170c0508cd9d02cd41e7

  • SSDEEP

    49152:PoF2MMuR+S/SJeyo7144XYM/pf2G8wK/FtoxkEta+s8KuqGaX0ToIBAUZLYp8:Q9Mu1SzUm4XHb8vFtYkQJJBAUZLE

Malware Config

Targets

    • Target

      eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19

    • Size

      2.7MB

    • MD5

      1c5db3ef3cac4c9a894c5a1255476b94

    • SHA1

      5c091d5020d23f0a3a3c3f923cfbe9c3f9afc1ff

    • SHA256

      eb7e288f1289acec3df23db595831e23c8488c8f3fcad61411098bd046a1fc19

    • SHA512

      c2e05803fbf225e95a3ee5fb0d8b8d76b704a124bfbd9a6ac90cf300047817ea25e432d9b97ffc9904e88eb41c4d28687ccdc49872cb170c0508cd9d02cd41e7

    • SSDEEP

      49152:PoF2MMuR+S/SJeyo7144XYM/pf2G8wK/FtoxkEta+s8KuqGaX0ToIBAUZLYp8:Q9Mu1SzUm4XHb8vFtYkQJJBAUZLE

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks