General
-
Target
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc
-
Size
856KB
-
Sample
231016-tgeywsbh26
-
MD5
9b14670e40993215d783879335504569
-
SHA1
c989492b72c0f7db2a488fd7607e0caed2d9d9ec
-
SHA256
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc
-
SHA512
75c5480a1b8df08ebaa98d3d108e962053d8b6024e5a6c766993d4c3239d358e3be384b7c4eefa3aa1594f4fbf6dda6f8cf18cca2a573797e8a037aa37a7a9ff
-
SSDEEP
24576:PtYP6FReFi/I2x+cgveqpAGU9AgIQaZdPAFaLZz:W0Gb2x+a3GIxabQaL9
Static task
static1
Behavioral task
behavioral1
Sample
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc
-
Size
856KB
-
MD5
9b14670e40993215d783879335504569
-
SHA1
c989492b72c0f7db2a488fd7607e0caed2d9d9ec
-
SHA256
6e69b26d5167a83e3cf669b3d0ad47797894b3b84879b97585d5929cd3bc7adc
-
SHA512
75c5480a1b8df08ebaa98d3d108e962053d8b6024e5a6c766993d4c3239d358e3be384b7c4eefa3aa1594f4fbf6dda6f8cf18cca2a573797e8a037aa37a7a9ff
-
SSDEEP
24576:PtYP6FReFi/I2x+cgveqpAGU9AgIQaZdPAFaLZz:W0Gb2x+a3GIxabQaL9
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-