General

  • Target

    tmp

  • Size

    888KB

  • Sample

    230901-jg48nsdd4y

  • MD5

    a60eb6b05e9aa663aa574603aa4b7688

  • SHA1

    1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8

  • SHA256

    9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e

  • SHA512

    678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370

  • SSDEEP

    24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l

Malware Config

Targets

    • Target

      tmp

    • Size

      888KB

    • MD5

      a60eb6b05e9aa663aa574603aa4b7688

    • SHA1

      1bea14088e5fa1d7e46a4a1d7f3c3fa5b395c7f8

    • SHA256

      9387843ba50bc2600c26e7fe86b6d40e1dc5db5d685dbbf681cbcb50eb6cab5e

    • SHA512

      678744d6831d2736b913fe9a5c4d3f7ce077c78eb5ec1f187228541e57501ddc0ed5b5dab43a682590bb50a858503ea5936304c325fa457aef0129c82805f370

    • SSDEEP

      24576:MVjTGZQFooOuciaIB0dFkSCyOlRUJd0kSSJinrRVlr+M6l:MQGsgBAkSCEd0kSEijlr+M6l

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks