General
-
Target
dawdwadaw.scr
-
Size
681KB
-
Sample
220823-r3etxafdgn
-
MD5
0cfa5f7c008e3dc2df275a99aef9cbbb
-
SHA1
51ebdbc8a8227667b20b5cb40f17ff1bb8550098
-
SHA256
e4f59660bf5047db2ed2539ef9a3e81724909809dc17c4f513debe261e1774e1
-
SHA512
bac124c7bd934b1bc9ba9fd09ada77fe2c37208637337a349f2ee213f91e81ae401e3ec9910a7cfe7aff991d49be986d448ab6a834cb1b9709ceccb4f64bb37e
-
SSDEEP
12288:C3c6vReZYEe4Wp0ZtExFUH17EjGh1aoNRtwamePvNVtQe:C3c6vAZYd4jKoiIFRmePvNVtn
Static task
static1
Behavioral task
behavioral1
Sample
dawdwadaw.scr
Resource
win10v2004-20220812-en
Malware Config
Extracted
asyncrat
0.5.7B
WindowsSystem GuardRuntime
217.64.31.3:8437
WindowsSystem GuardRuntime
-
delay
3
-
install
false
-
install_file
WindowsSystem Guard Runtime.exe
-
install_folder
%AppData%
Extracted
blacknet
v3.7.0 Public
XSFcRG
http://fakirlerclub.xyz/blacknet
BN[ac95ac7ad595b3dbd5ad73e4bf7daac9]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
false
-
usb_spread
false
Extracted
asyncrat
0.5.7B
SecurityHealth Service
217.64.31.3:8437
SecurityHealth Service
-
delay
3
-
install
false
-
install_file
SecurityHealth Service.exe
-
install_folder
%AppData%
Extracted
asyncrat
1.0.7
Windows DefenderSmartScreen
217.64.31.3:9742
Windows DefenderSmartScreen
-
delay
1
-
install
false
-
install_file
Windows DefenderSmartScreen
-
install_folder
%AppData%
Targets
-
-
Target
dawdwadaw.scr
-
Size
681KB
-
MD5
0cfa5f7c008e3dc2df275a99aef9cbbb
-
SHA1
51ebdbc8a8227667b20b5cb40f17ff1bb8550098
-
SHA256
e4f59660bf5047db2ed2539ef9a3e81724909809dc17c4f513debe261e1774e1
-
SHA512
bac124c7bd934b1bc9ba9fd09ada77fe2c37208637337a349f2ee213f91e81ae401e3ec9910a7cfe7aff991d49be986d448ab6a834cb1b9709ceccb4f64bb37e
-
SSDEEP
12288:C3c6vReZYEe4Wp0ZtExFUH17EjGh1aoNRtwamePvNVtQe:C3c6vAZYd4jKoiIFRmePvNVtn
-
BlackNET payload
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies WinLogon for persistence
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-