General

  • Target

    e3a9ecfb567ddc6d3210f74048c0908adb4fac931e99d1db28e5268df52e1987

  • Size

    552KB

  • Sample

    240111-nrzhdsfagn

  • MD5

    da99fa51ef84d3cdd87b608ee83688d5

  • SHA1

    5e8f6d9e907f992ee6ad4812d9b7db3664734069

  • SHA256

    e3a9ecfb567ddc6d3210f74048c0908adb4fac931e99d1db28e5268df52e1987

  • SHA512

    4c7921434db803d98502d3f3e9e2843ff918c5a4a77f3cded52b8c3abc84f7b82f3cf303a8397a83782ab14c1bf3a91867b1e2f5c5018249baa91cb0abfe4700

  • SSDEEP

    3072:r5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6EIP:t7hoBO/fzxUpFmkgXO+T/6E

Malware Config

Targets

    • Target

      e3a9ecfb567ddc6d3210f74048c0908adb4fac931e99d1db28e5268df52e1987

    • Size

      552KB

    • MD5

      da99fa51ef84d3cdd87b608ee83688d5

    • SHA1

      5e8f6d9e907f992ee6ad4812d9b7db3664734069

    • SHA256

      e3a9ecfb567ddc6d3210f74048c0908adb4fac931e99d1db28e5268df52e1987

    • SHA512

      4c7921434db803d98502d3f3e9e2843ff918c5a4a77f3cded52b8c3abc84f7b82f3cf303a8397a83782ab14c1bf3a91867b1e2f5c5018249baa91cb0abfe4700

    • SSDEEP

      3072:r5OsiQ79xzUcbK9LK/fzuaCrutJUDpRfmm5yqiXO+Zoy/6EIP:t7hoBO/fzxUpFmkgXO+T/6E

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks