General

  • Target

    a3f066cfd5e7c2f86e9177a30dcc7fac86edd2e7a9a5dd3723a3332397517760

  • Size

    848KB

  • Sample

    231020-n91s6sae91

  • MD5

    fcf04d6f797576c8795ccd8c4cdae68e

  • SHA1

    ab98ce9d0fe89d27691cc27ce9adc3e2bc555950

  • SHA256

    a3f066cfd5e7c2f86e9177a30dcc7fac86edd2e7a9a5dd3723a3332397517760

  • SHA512

    a4e92b8ecf80a573ba7bba9e453c78c273269e26aed4d0274f290961a3b500ba6c1343d40fe78b5d25336f727eb6b6a4d04d1f9971f0e563173e8bb62a183edf

  • SSDEEP

    12288:mLL/Ws9Gu+bS6scH3ouHAVQcIaiAJKZADpvzTnFotWzKICt5Jjrc5f1N+qa:S6xNXXougGegZeVnatWzKtB6N+qa

Malware Config

Targets

    • Target

      a3f066cfd5e7c2f86e9177a30dcc7fac86edd2e7a9a5dd3723a3332397517760

    • Size

      848KB

    • MD5

      fcf04d6f797576c8795ccd8c4cdae68e

    • SHA1

      ab98ce9d0fe89d27691cc27ce9adc3e2bc555950

    • SHA256

      a3f066cfd5e7c2f86e9177a30dcc7fac86edd2e7a9a5dd3723a3332397517760

    • SHA512

      a4e92b8ecf80a573ba7bba9e453c78c273269e26aed4d0274f290961a3b500ba6c1343d40fe78b5d25336f727eb6b6a4d04d1f9971f0e563173e8bb62a183edf

    • SSDEEP

      12288:mLL/Ws9Gu+bS6scH3ouHAVQcIaiAJKZADpvzTnFotWzKICt5Jjrc5f1N+qa:S6xNXXougGegZeVnatWzKtB6N+qa

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks