General

  • Target

    b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8

  • Size

    1.8MB

  • Sample

    231115-m17dxsga46

  • MD5

    108fde1527d48fabd718d3b25d58ce40

  • SHA1

    fdd49fafb3fc40b700204f60d754143468762f4d

  • SHA256

    b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8

  • SHA512

    140a12f14e3733a4a2989dccf645033e628684bcd4c56e63c7d2d22ed2893ce71e986e6c1ef04fde121125dbed128d48245d121980ac0bceb2fe7fdc809e6e04

  • SSDEEP

    12288:uvTIiUxmYh90jjAblb1yHy8ZV0Lug6BtPtzFS30pS6zxgIsxITrLpyPYCSXh1M2p:ubIiCm898jGyS8RY3VSdsxIPL1/xUU

Malware Config

Targets

    • Target

      b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8

    • Size

      1.8MB

    • MD5

      108fde1527d48fabd718d3b25d58ce40

    • SHA1

      fdd49fafb3fc40b700204f60d754143468762f4d

    • SHA256

      b4d51b0354e7508d723396fa6affd92b5108fa3cd27ecd4c86001a5ffb999cb8

    • SHA512

      140a12f14e3733a4a2989dccf645033e628684bcd4c56e63c7d2d22ed2893ce71e986e6c1ef04fde121125dbed128d48245d121980ac0bceb2fe7fdc809e6e04

    • SSDEEP

      12288:uvTIiUxmYh90jjAblb1yHy8ZV0Lug6BtPtzFS30pS6zxgIsxITrLpyPYCSXh1M2p:ubIiCm898jGyS8RY3VSdsxIPL1/xUU

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks