General

  • Target

    636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a

  • Size

    429KB

  • Sample

    230609-nvacnsch21

  • MD5

    23f50c4bff4b1018a5b24dca1e9a525d

  • SHA1

    366ae616becd1beaa884ab87659468921a32b8ab

  • SHA256

    636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a

  • SHA512

    3b8f205a2ae57be0635f470411afeacf4c95f83594d415bd0472f6afa0f50ed1b04e29a65e2db48b7ead45357f5aa602a8427e200b7dbedf4611a2dd062bbb16

  • SSDEEP

    12288:uFwqoSpOurJqsoXlkY70Oti5RmgNmz5sCB:ubowfon0Wijmww

Score
10/10

Malware Config

Extracted

Family

blacknet

Version

v3.6.0 Public

Botnet

HacKed

C2

http://bankslip.info/david/

Mutex

BN[lnUntCqW-7778345]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    a5b002eacf54590ec8401ff6d3f920ee

  • startup

    false

  • usb_spread

    false

Targets

    • Target

      636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a

    • Size

      429KB

    • MD5

      23f50c4bff4b1018a5b24dca1e9a525d

    • SHA1

      366ae616becd1beaa884ab87659468921a32b8ab

    • SHA256

      636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a

    • SHA512

      3b8f205a2ae57be0635f470411afeacf4c95f83594d415bd0472f6afa0f50ed1b04e29a65e2db48b7ead45357f5aa602a8427e200b7dbedf4611a2dd062bbb16

    • SSDEEP

      12288:uFwqoSpOurJqsoXlkY70Oti5RmgNmz5sCB:ubowfon0Wijmww

    Score
    10/10
    • BlackNET

      BlackNET is an open source remote access tool written in VB.NET.

    • BlackNET payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks