General

  • Target

    4054ee21cbfc210489f119c2d717ca1ae43129fc0d07aefe322fabb3b61d079f.exe

  • Size

    76KB

  • Sample

    210825-8q2pmxktlj

  • MD5

    bc15770f9c1c0735cb5cc9d800476ab0

  • SHA1

    7700f53b4de7abcd0aa28a1989f73aad394b49bb

  • SHA256

    4054ee21cbfc210489f119c2d717ca1ae43129fc0d07aefe322fabb3b61d079f

  • SHA512

    1073a97fbd39f6d96b05d8a52f8d1e9759b879d9fcf4089f1159a3cbed55e0ca6b3da529df09bae0f1c37c259c482c7e56d279e7c0afa58c6f3cbaff615762d4

Malware Config

Extracted

Family

blacknet

Version

v3.6.0 Public

Botnet

HaCk

C2

http://gpay-safe.ru/x/

Mutex

BN[vSqieqIW-9794388]

Attributes
  • antivm

    true

  • elevate_uac

    false

  • install_name

    winhost.exe

  • splitter

    |BN|

  • start_name

    a5b002eacf54590ec8401ff6d3f920ee

  • startup

    true

  • usb_spread

    false

Targets

    • Target

      4054ee21cbfc210489f119c2d717ca1ae43129fc0d07aefe322fabb3b61d079f.exe

    • Size

      76KB

    • MD5

      bc15770f9c1c0735cb5cc9d800476ab0

    • SHA1

      7700f53b4de7abcd0aa28a1989f73aad394b49bb

    • SHA256

      4054ee21cbfc210489f119c2d717ca1ae43129fc0d07aefe322fabb3b61d079f

    • SHA512

      1073a97fbd39f6d96b05d8a52f8d1e9759b879d9fcf4089f1159a3cbed55e0ca6b3da529df09bae0f1c37c259c482c7e56d279e7c0afa58c6f3cbaff615762d4

    • BlackNET

      BlackNET is an open source remote access tool written in VB.NET.

    • BlackNET Payload

    • suricata: ET MALWARE Win32/BlackNET CnC Keep-Alive

      suricata: ET MALWARE Win32/BlackNET CnC Keep-Alive

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks