General

  • Target

    f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9

  • Size

    3.3MB

  • Sample

    240713-hcwkaszdmj

  • MD5

    0d3bbd53d76c3b625da39c50fb00ea30

  • SHA1

    2c919e370cf9166b91f3d586a1618df24a349d7c

  • SHA256

    f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9

  • SHA512

    bd919245623db347895af691c8d7705740aa39e9c44a634aa9c8f9918125de46c955cc69397a9caf84203a033750d4443552f08e64bc74305111bed339b07168

  • SSDEEP

    49152:t/3Uxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/ET0uDhEv4n4M

Malware Config

Targets

    • Target

      f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9

    • Size

      3.3MB

    • MD5

      0d3bbd53d76c3b625da39c50fb00ea30

    • SHA1

      2c919e370cf9166b91f3d586a1618df24a349d7c

    • SHA256

      f22b785b33c40c33339c6aca991d641eed3242d26d3aeab1dcb09b2d98989ce9

    • SHA512

      bd919245623db347895af691c8d7705740aa39e9c44a634aa9c8f9918125de46c955cc69397a9caf84203a033750d4443552f08e64bc74305111bed339b07168

    • SSDEEP

      49152:t/3Uxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/ET0uDhEv4n4M

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Chinese Botnet payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks