General
-
Target
90071cffdfe6465b764829a706fe27f1abbb58d719bfcb428b210ae8c939a320
-
Size
228KB
-
Sample
201109-3fyklnqg4j
-
MD5
e12000b9b526a5caff5b13d2cb2d07d0
-
SHA1
7f9227195996aac1d27b38d5b95a837e8c2b43c2
-
SHA256
90071cffdfe6465b764829a706fe27f1abbb58d719bfcb428b210ae8c939a320
-
SHA512
a506b0e76e72cf2e4f92e60c12ac4cee7aedcca37e3aa6c71eb3150438363122e4e880608cfde334c51de4aaf9e5677d5a7b353f1fb3ef49741ef9a3467a2643
Static task
static1
Behavioral task
behavioral1
Sample
90071cffdfe6465b764829a706fe27f1abbb58d719bfcb428b210ae8c939a320.exe
Resource
win7v20201028
Malware Config
Extracted
blacknet
v3.5 Public
Microwave
http://thehacker.club/update
BN[GBefMSlt-8433340]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
14247ae8e9bdf8a07859c46cc6c701e5
-
startup
false
-
usb_spread
false
Targets
-
-
Target
90071cffdfe6465b764829a706fe27f1abbb58d719bfcb428b210ae8c939a320
-
Size
228KB
-
MD5
e12000b9b526a5caff5b13d2cb2d07d0
-
SHA1
7f9227195996aac1d27b38d5b95a837e8c2b43c2
-
SHA256
90071cffdfe6465b764829a706fe27f1abbb58d719bfcb428b210ae8c939a320
-
SHA512
a506b0e76e72cf2e4f92e60c12ac4cee7aedcca37e3aa6c71eb3150438363122e4e880608cfde334c51de4aaf9e5677d5a7b353f1fb3ef49741ef9a3467a2643
-
BlackNET Payload
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-