General

  • Target

    70Server.exe

  • Size

    748KB

  • Sample

    230815-r7wyzsdb31

  • MD5

    19bfecea34452c2523dd895bab3cabad

  • SHA1

    5f009fdd6acc88099077bda15e381d7730831e43

  • SHA256

    f5fd15e4f561d935846d227639d2af2c5a19c9f7932adcc6da0bff654eb42517

  • SHA512

    648677be097472f7eae9ef2a503379c68230c7278b394282948ab2faee9e5a4cf08094199af87f8b48dcced9307b62fc3a18cb271e94827e6e096354cba5ef84

  • SSDEEP

    6144:zHzIhp/8eYjbeb/yQpDa3ST+7GB65HoFN6WtljaJul+pw8T:LkIbWzNa3STSGE5HoFN6WtljaElI9T

Malware Config

Targets

    • Target

      70Server.exe

    • Size

      748KB

    • MD5

      19bfecea34452c2523dd895bab3cabad

    • SHA1

      5f009fdd6acc88099077bda15e381d7730831e43

    • SHA256

      f5fd15e4f561d935846d227639d2af2c5a19c9f7932adcc6da0bff654eb42517

    • SHA512

      648677be097472f7eae9ef2a503379c68230c7278b394282948ab2faee9e5a4cf08094199af87f8b48dcced9307b62fc3a18cb271e94827e6e096354cba5ef84

    • SSDEEP

      6144:zHzIhp/8eYjbeb/yQpDa3ST+7GB65HoFN6WtljaJul+pw8T:LkIbWzNa3STSGE5HoFN6WtljaElI9T

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks