General
-
Target
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede
-
Size
380KB
-
Sample
230827-ag9zgsgc4z
-
MD5
f9e0ed4ee974d1b0482d4ddafc145c5c
-
SHA1
abf8bb1f876a624780b69148d3bfac4b1b5d1699
-
SHA256
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede
-
SHA512
7d0edcb2c70a422ad9b9a0b0e0847a9b214d1ba91a7bf062419f990858110972834fc5fe6bdd56a4673f77d2bf67a91c7e409c5424f889ca64e069721bb6a4fe
-
SSDEEP
3072:cmgg0YcfYYOR3YtyV2GenT0cTtm2LAQSXVqjzpYfJh9Y5:9ggLcfzOr2GenQ67wk3pyJh9Y5
Static task
static1
Behavioral task
behavioral1
Sample
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede
-
Size
380KB
-
MD5
f9e0ed4ee974d1b0482d4ddafc145c5c
-
SHA1
abf8bb1f876a624780b69148d3bfac4b1b5d1699
-
SHA256
eb29ebabe206a22520ca5dc77982b4b4412872571013ae78fcfe8f39d7769ede
-
SHA512
7d0edcb2c70a422ad9b9a0b0e0847a9b214d1ba91a7bf062419f990858110972834fc5fe6bdd56a4673f77d2bf67a91c7e409c5424f889ca64e069721bb6a4fe
-
SSDEEP
3072:cmgg0YcfYYOR3YtyV2GenT0cTtm2LAQSXVqjzpYfJh9Y5:9ggLcfzOr2GenQ67wk3pyJh9Y5
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-