General
-
Target
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723
-
Size
2.4MB
-
Sample
230807-lcgypafg9x
-
MD5
67845f7a3fa8c3047a935537138aa904
-
SHA1
6f96ae0992998958151d67a7f88b77255c64ba81
-
SHA256
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723
-
SHA512
e3fe14a7f714b4c7510a56a4a2f610bd2ccac425e53167f57570879278a19dfa106d4b6849a63148f9aa645939d26631c80d29b1627f0817c715e447dfbe3f87
-
SSDEEP
49152:tB/FdWJ4wklBDP1dGXrIDhmIeYZTozEvaoQ/Xn/Gj1qnrntX4AKhH/:PskDP1dOcd8Avdj1o7tCx
Behavioral task
behavioral1
Sample
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723
-
Size
2.4MB
-
MD5
67845f7a3fa8c3047a935537138aa904
-
SHA1
6f96ae0992998958151d67a7f88b77255c64ba81
-
SHA256
9268c2492e5b2f5cbc0780d7add2459790d5a4040d8927b830e0b3be54c85723
-
SHA512
e3fe14a7f714b4c7510a56a4a2f610bd2ccac425e53167f57570879278a19dfa106d4b6849a63148f9aa645939d26631c80d29b1627f0817c715e447dfbe3f87
-
SSDEEP
49152:tB/FdWJ4wklBDP1dGXrIDhmIeYZTozEvaoQ/Xn/Gj1qnrntX4AKhH/:PskDP1dOcd8Avdj1o7tCx
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-