General
-
Target
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a.exe
-
Size
429KB
-
Sample
230609-nv5tksch3t
-
MD5
23f50c4bff4b1018a5b24dca1e9a525d
-
SHA1
366ae616becd1beaa884ab87659468921a32b8ab
-
SHA256
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a
-
SHA512
3b8f205a2ae57be0635f470411afeacf4c95f83594d415bd0472f6afa0f50ed1b04e29a65e2db48b7ead45357f5aa602a8427e200b7dbedf4611a2dd062bbb16
-
SSDEEP
12288:uFwqoSpOurJqsoXlkY70Oti5RmgNmz5sCB:ubowfon0Wijmww
Static task
static1
Behavioral task
behavioral1
Sample
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a.exe
Resource
win7-20230220-en
Malware Config
Extracted
blacknet
v3.6.0 Public
HacKed
http://bankslip.info/david/
BN[lnUntCqW-7778345]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
a5b002eacf54590ec8401ff6d3f920ee
-
startup
false
-
usb_spread
false
Targets
-
-
Target
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a.exe
-
Size
429KB
-
MD5
23f50c4bff4b1018a5b24dca1e9a525d
-
SHA1
366ae616becd1beaa884ab87659468921a32b8ab
-
SHA256
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a
-
SHA512
3b8f205a2ae57be0635f470411afeacf4c95f83594d415bd0472f6afa0f50ed1b04e29a65e2db48b7ead45357f5aa602a8427e200b7dbedf4611a2dd062bbb16
-
SSDEEP
12288:uFwqoSpOurJqsoXlkY70Oti5RmgNmz5sCB:ubowfon0Wijmww
-
BlackNET payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-