Analysis
-
max time kernel
46s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 16:01
Behavioral task
behavioral1
Sample
a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe
Resource
win10v2004-20240226-en
General
-
Target
a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe
-
Size
468KB
-
MD5
a34d6327f5e271b2a9160d95c31c3079
-
SHA1
dfb679c8136695f374c31901df459e1ff04b611f
-
SHA256
a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05
-
SHA512
644dce5494a540ae55fd71f6d39e628b69bc4f9248c1e1bf4be7051dae9de62207ca4fff93abf20129f9e1546e94cb430c8b1a1b514f732cfec481cb1c5bcfd9
-
SSDEEP
3072:GyfZbD3v5+6eRod1kPgGZmKa95wVo06OmRqIzEke+O:JfZ3vEaLWpmr95wS1OIFA
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
resource yara_rule behavioral2/memory/1324-2-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral2/memory/1324-7-0x0000000000400000-0x0000000000493000-memory.dmp unk_chinese_botnet -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zybnilp.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe" a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 a63c167748663147e6cd4121290365a5f157c71f5860140b0660c593c09cae05.exe