General
-
Target
23f50c4bff4b1018a5b24dca1e9a525d.bin
-
Size
371KB
-
Sample
230611-bjq5tsgb83
-
MD5
d683feb9ea757cfd2ac0c914743769c6
-
SHA1
8557c0ff5ac8fdf3b00af6122d8e5c1d4a068565
-
SHA256
61317d21af36bf0640cbb2d71db860ce698a8cbe4cf38b433a4b04441ed1b7fe
-
SHA512
c0dad3c3062655ebd147807ee8e6297ea52191a5af98d043efb1a59f8f6563d757c9900776b08ee9e374eef2ebe0e1384751248f9fa4e116b74705f56097b0e0
-
SSDEEP
6144:VaEdOx33eIjv1dOSXFCyuKfwxOkzxzdsWCteMbL9G/CLTxeYnolUD8lOXjKlFMC/:gE833hd1FduKfwxOcCWmeMXNxfuUD1Xy
Static task
static1
Behavioral task
behavioral1
Sample
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a.exe
Resource
win7-20230220-en
Malware Config
Extracted
blacknet
v3.6.0 Public
HacKed
http://bankslip.info/david/
BN[lnUntCqW-7778345]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
a5b002eacf54590ec8401ff6d3f920ee
-
startup
false
-
usb_spread
false
Targets
-
-
Target
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a.exe
-
Size
429KB
-
MD5
23f50c4bff4b1018a5b24dca1e9a525d
-
SHA1
366ae616becd1beaa884ab87659468921a32b8ab
-
SHA256
636586494bbb8266d974ac3dd259d1290c94c96a98d00165c502aafbbca5447a
-
SHA512
3b8f205a2ae57be0635f470411afeacf4c95f83594d415bd0472f6afa0f50ed1b04e29a65e2db48b7ead45357f5aa602a8427e200b7dbedf4611a2dd062bbb16
-
SSDEEP
12288:uFwqoSpOurJqsoXlkY70Oti5RmgNmz5sCB:ubowfon0Wijmww
-
BlackNET payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-