General

  • Target

    af85dab4cd082df053f338cc538d4a1fec2d10c1e02793b7dee79a464e0de19d

  • Size

    378KB

  • Sample

    240417-rh8aqacg5x

  • MD5

    7a023c003bca46148d10c53e086e14ce

  • SHA1

    7a782a2e2320f0f920bde4b8321ec603cdb1738d

  • SHA256

    af85dab4cd082df053f338cc538d4a1fec2d10c1e02793b7dee79a464e0de19d

  • SHA512

    bcb52656eb8e929c85644f65561833099b894cb39fcbd7999062f8c01fb4460206ed07a67f69f07c5d32b8d89eeb6bcb40c9db08c6f748cc2cde6d05116d6605

  • SSDEEP

    6144:co9jVuKSCrWBfdA3xwAvzs9C2SclsPYVxtzbSkxj6CMbM/NC8Gv9KWixPImx61k:co9jVufBdOxwAx5ozbPxeCqCNpQ9KW0v

Malware Config

Extracted

Family

blacknet

Botnet

Windows Update

C2

wOzx3g1DVutJaIF8JkCiLDWWDUVaGVAFT9MNNbf3GHejuL8mYQHtmLByJVduHMIIMCJOTkByRDSvMbknVYDMjFMd33ucCNGRd6rsd55Kjfz5N8toWqPtUAUWFp2VPBqwDphjXZsEuRw6KPvEHxNrRtmmNF3TSPIX5em2yZySCQTum749uJG4nmFWEHI/cH1NCAx4fFkBSOcgGykeOVQl1nGRgAHWZfv9g9qNaMeeu53b56HQWR/mZ6mTILTeO979h0iF42Y1WsHlP1Cd9xLI0jeNeBHY9FCS6EZPmLXKu/X9q8n26O7UQt6xg0ujFGbbUZ8glKZ26j6atQFXHOQGag==

Mutex

BN[fEVvWhbt-6079003]

Attributes
  • antivm

    true

  • elevate_uac

    true

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    35dcbc7eb742dd4f1edfbccf7826c724

  • startup

    true

  • usb_spread

    true

Targets

    • Target

      662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe

    • Size

      493KB

    • MD5

      ad5d8a274eaff455047d801ee9b6231f

    • SHA1

      1a43eb1ae77914cb58e6cffc8a4e8a1eebfee7d2

    • SHA256

      662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3

    • SHA512

      ceb178dbb8e913c489de2eb7cb8c3d3f16b574934155a8fe6d73ec6235e40bb76fdffb34ae33a8e38abd912e3df5efd624104db9693e929e4bd0087b2b266932

    • SSDEEP

      12288:uxjrr7F5qfMs8WdcOX+t4c08no9IaJnv+N6G/wWEh59ma4:uxLsMs8WdcMx8+I+TDV4

    • BlackNET

      BlackNET is an open source remote access tool written in VB.NET.

    • BlackNET payload

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks