General

  • Target

    tmp

  • Size

    936KB

  • Sample

    240419-tsj2zsgh58

  • MD5

    f21c518bcafa5fe911f17ffb3c1797b0

  • SHA1

    6ddf4338b8802ed0e698af6d78695cc12d7e55d6

  • SHA256

    a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8

  • SHA512

    482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f

  • SSDEEP

    24576:pyF2ZifBvlGsu6ot9vtC1FoV1pltylcVHhE9HZ:4FN5vUikV1XacrEr

Malware Config

Targets

    • Target

      tmp

    • Size

      936KB

    • MD5

      f21c518bcafa5fe911f17ffb3c1797b0

    • SHA1

      6ddf4338b8802ed0e698af6d78695cc12d7e55d6

    • SHA256

      a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8

    • SHA512

      482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f

    • SSDEEP

      24576:pyF2ZifBvlGsu6ot9vtC1FoV1pltylcVHhE9HZ:4FN5vUikV1XacrEr

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks