General
-
Target
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e
-
Size
2.7MB
-
Sample
231129-fqtlraed96
-
MD5
d6364b4a7155dceb57075a6269b0e2e3
-
SHA1
05553d7e2b28199d2c69c79de9e615307a3c68e4
-
SHA256
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e
-
SHA512
2b280f4cdac9872b3ba142e30237e5274b80d82dea6ec93f5927c193a5eb166d4f4b5665bc525ecec3acb216d81897b7a6abcd0bc912a1d4938293476d6e820f
-
SSDEEP
24576:chRb0i6yW2ekPl03eaYdsxIxZknqinYaFh678uL1cjioszjaD8LCJeM9G37Xvf:cHoL2e9urKyxyqS6Bcj6iVJVKf
Static task
static1
Behavioral task
behavioral1
Sample
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe
Resource
win10v2004-20231127-en
Malware Config
Targets
-
-
Target
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e
-
Size
2.7MB
-
MD5
d6364b4a7155dceb57075a6269b0e2e3
-
SHA1
05553d7e2b28199d2c69c79de9e615307a3c68e4
-
SHA256
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e
-
SHA512
2b280f4cdac9872b3ba142e30237e5274b80d82dea6ec93f5927c193a5eb166d4f4b5665bc525ecec3acb216d81897b7a6abcd0bc912a1d4938293476d6e820f
-
SSDEEP
24576:chRb0i6yW2ekPl03eaYdsxIxZknqinYaFh678uL1cjioszjaD8LCJeM9G37Xvf:cHoL2e9urKyxyqS6Bcj6iVJVKf
Score10/10-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-