General

  • Target

    db44e707e44acd97873977cbf40e96db1b3695e2674fb338384ba62f38fd19bf

  • Size

    828KB

  • Sample

    240329-sjx2tabb5x

  • MD5

    fd8e47b837b0cabc437527611971f5cd

  • SHA1

    98e349e25617fe03669c079a19272d782d2b875d

  • SHA256

    db44e707e44acd97873977cbf40e96db1b3695e2674fb338384ba62f38fd19bf

  • SHA512

    2aadd0c574ab773ed1bdb587d45bed58bf330a0df72c28147dfea542012a5185e06b387a9a085fd45e3619d17fe895a41cbe4014e054be0dc2d10fc71b654485

  • SSDEEP

    24576:ZY6NjevRskkgMm+rq/zRg9K3xXXIZ2qLLJ:ZjK+OBFXIHN

Malware Config

Targets

    • Target

      db44e707e44acd97873977cbf40e96db1b3695e2674fb338384ba62f38fd19bf

    • Size

      828KB

    • MD5

      fd8e47b837b0cabc437527611971f5cd

    • SHA1

      98e349e25617fe03669c079a19272d782d2b875d

    • SHA256

      db44e707e44acd97873977cbf40e96db1b3695e2674fb338384ba62f38fd19bf

    • SHA512

      2aadd0c574ab773ed1bdb587d45bed58bf330a0df72c28147dfea542012a5185e06b387a9a085fd45e3619d17fe895a41cbe4014e054be0dc2d10fc71b654485

    • SSDEEP

      24576:ZY6NjevRskkgMm+rq/zRg9K3xXXIZ2qLLJ:ZjK+OBFXIHN

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks