General

  • Target

    236983199032544c4205829e4c96282a6d9c6d4c4a117df3796c5590b0132383

  • Size

    88KB

  • MD5

    a4f5fc179540a0b155d91b489e6811e2

  • SHA1

    d979a3aba5bcd03301dd474ecac30936b3bb2a70

  • SHA256

    236983199032544c4205829e4c96282a6d9c6d4c4a117df3796c5590b0132383

  • SHA512

    cae154972f2eac2bad3bf61045c830221ef05b0422c7f024820dc6b48604b21edcad26ff35f014e0f3d6cf97269978e8518d2cdff142add20312b06dd43a2d08

  • SSDEEP

    768:LgLZRKqi00W2QYeVB8RrG5uTi2ist0l+Y5+8r9tUD9yHgK4U5gcc6jymc3:LgLf/0LvrG5fsDor0D9yHgK4U5gV7

Score
10/10

Malware Config

Extracted

Family

blacknet

Version

v3.5.1 Public

Botnet

[ID]

C2

[HOST]

Mutex

[MUTEX]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    [Install_Name]

  • splitter

    |BN|

  • start_name

    [StartupName]

  • startup

    false

  • usb_spread

    false

aes.plain

Signatures

  • BlackNET Payload 1 IoCs
  • Blacknet family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

Files

  • 236983199032544c4205829e4c96282a6d9c6d4c4a117df3796c5590b0132383
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections