General

  • Target

    a2d0dd1cb89611c7e979d65a73d51a573de55fb14f1130f28196618a828932c5

  • Size

    1.8MB

  • Sample

    231026-lfq1rsfh8w

  • MD5

    d2f35a6f207bc1d197a8f43c2d31d8ff

  • SHA1

    4645a201aeaa2e3ebed2681908d7a459ec72d8b0

  • SHA256

    a2d0dd1cb89611c7e979d65a73d51a573de55fb14f1130f28196618a828932c5

  • SHA512

    6a648b3cda34f6e62505828456b8f74a9073b40aebfa2965ae7fe36717969a8444ea4c94a9c4ec498a655be6d41d0bb2c2bbcf9a246813fe3f995de4d6775ffd

  • SSDEEP

    24576:XqgLbQGiEwAUnxA7H0slfGJpmd4qEvLtbQgxaO/VXuLOpfdIuA0Fre2M6QJ:XrbRwDC7AmsvnVXdQuA/7R

Malware Config

Targets

    • Target

      a2d0dd1cb89611c7e979d65a73d51a573de55fb14f1130f28196618a828932c5

    • Size

      1.8MB

    • MD5

      d2f35a6f207bc1d197a8f43c2d31d8ff

    • SHA1

      4645a201aeaa2e3ebed2681908d7a459ec72d8b0

    • SHA256

      a2d0dd1cb89611c7e979d65a73d51a573de55fb14f1130f28196618a828932c5

    • SHA512

      6a648b3cda34f6e62505828456b8f74a9073b40aebfa2965ae7fe36717969a8444ea4c94a9c4ec498a655be6d41d0bb2c2bbcf9a246813fe3f995de4d6775ffd

    • SSDEEP

      24576:XqgLbQGiEwAUnxA7H0slfGJpmd4qEvLtbQgxaO/VXuLOpfdIuA0Fre2M6QJ:XrbRwDC7AmsvnVXdQuA/7R

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • UAC bypass

    • Windows security bypass

    • Chinese Botnet payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks