General

  • Target

    ce52605de786f0cc40c456b8de0742fe8d6f0b426de812033a901f08168d1d35

  • Size

    131KB

  • MD5

    40ba4ae347f750e4d71f06f7982c8c67

  • SHA1

    5d6512146cbafb7d2545ca57fb4cbb2e7ec99c98

  • SHA256

    ce52605de786f0cc40c456b8de0742fe8d6f0b426de812033a901f08168d1d35

  • SHA512

    8967e67fa7b8d135036d719fa3fb0688da37336d4ec48b07442dbc123454f8c8540d161150ca571795562101c32b05cec061d782f921bcb04b73dea8dfca9240

  • SSDEEP

    1536:6W27RutYPWEB9iefYRTCCaH2pw3bv4UFZL209s7MzhLbbATOX1A/Zkjn1Rr:qJwTC72pw3bvLFxEM8Rkj7

Score
10/10

Malware Config

Extracted

Family

blacknet

Version

v3.5.1 Public

Botnet

Redengine

C2

http://boat.salvajesrp.com/

Mutex

BN[yfJZGMfn-6322239]

Attributes
  • antivm

    true

  • elevate_uac

    true

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    a4f5fc179540a0b155d91b489e6811e2

  • startup

    true

  • usb_spread

    false

aes.plain

Signatures

  • BlackNET payload 1 IoCs
  • Blacknet family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

Files

  • ce52605de786f0cc40c456b8de0742fe8d6f0b426de812033a901f08168d1d35
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections