General

  • Target

    c14e74f1d39c962a0015521019131b3df3d48ebb44996c83c1569d3ad189e68e.exe

  • Size

    75KB

  • MD5

    344392293aef0a7e7f30cbbde6e179c2

  • SHA1

    3a6197e3f0dcdba4c7b0e3ed25f88a2fc51fb3f9

  • SHA256

    c14e74f1d39c962a0015521019131b3df3d48ebb44996c83c1569d3ad189e68e

  • SHA512

    529671e2417d8ff5620e4fd44d84abbb69b523ebf4e85ec637eccfb85d2150c4ba49d801148e0861510d83df109cb4554cfef046677c077caf5210c7c16518ac

  • SSDEEP

    1536:pZuhD5z28TC2WmvbTkN1PeITgbSUPH4LJ0tYIq:u/jTkNY+gbSKHaJoYI

Score
10/10

Malware Config

Extracted

Family

blacknet

Botnet

HacKed

C2

http://dbhg.duckdns.org

Mutex

BN[ZGYKOnbZ-5872602]

Attributes
  • antivm

    true

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    35dcbc7eb742dd4f1edfbccf7826c724

  • startup

    true

  • usb_spread

    false

Signatures

  • BlackNET payload 1 IoCs
  • Blacknet family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c14e74f1d39c962a0015521019131b3df3d48ebb44996c83c1569d3ad189e68e.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections