MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4fcda5517e6673b3233c58d4738b079c6f944ce746dfc3b1dbf87f475f8ff364. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
BlackNET
Vendor detections: 12
| SHA256 hash: | 4fcda5517e6673b3233c58d4738b079c6f944ce746dfc3b1dbf87f475f8ff364 |
|---|---|
| SHA3-384 hash: | 37cbaa1544ba2230af4bccda612772e9e5da2a84881c8f931a59b1207aec65cc3afe890ed2833473cd17e87659749e67 |
| SHA1 hash: | b8d17306aa1c757e6329bb69d976c224e585838a |
| MD5 hash: | 4b71d55f16c4a497fb2457c340d5a8a6 |
| humanhash: | pennsylvania-virginia-robin-helium |
| File name: | 4B71D55F16C4A497FB2457C340D5A8A6.exe |
| Download: | download sample |
| Signature | BlackNET |
| File size: | 4'404'617 bytes |
| First seen: | 2021-07-23 04:15:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 98304:d1dVjOEK3uU86JKDXO2mljOYvEYAyEWajTBkxV7YJ4lD:pVjXKeyJ0XEOYsYAyzajTBkxTh |
| Threatray | 759 similar samples on MalwareBazaar |
| TLSH | T1BE163342B09164B2D47226301A38D63179BB7D211F18924BA7E57E9FBA305C3AE34F77 |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | BlackNet exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://54.237.66.139/receive.php | https://threatfox.abuse.ch/ioc/162036/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4B71D55F16C4A497FB2457C340D5A8A6.exe
Verdict:
Malicious activity
Analysis date:
2021-07-23 04:16:59 UTC
Tags:
trojan blacknet keylogger
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
BlackNET
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Agent Tesla AgentTesla BlackNET Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Creates files with lurking names (e.g. Crack.exe)
Detected Agent Tesla keylogger
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected BlackNET
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Exploit.BypassUac
Status:
Malicious
First seen:
2021-07-20 06:53:38 UTC
AV detection:
19 of 27 (70.37%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 749 additional samples on MalwareBazaar
Result
Malware family:
xmrig
Score:
10/10
Tags:
family:blacknet family:xmrig miner suricata trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Uses the VBS compiler for execution
Blocklisted process makes network request
Executes dropped EXE
XMRig Miner Payload
BlackNET
BlackNET Payload
Contains code to disable Windows Defender
suricata: ET MALWARE Win32/BlackNET CnC Keep-Alive
xmrig
Unpacked files
SH256 hash:
c362729899c5956cfa9fc3bcf9b21ac72066a1b84a497ceb1281f76e2f55c54b
MD5 hash:
0327d1374a5ce015ad9c83c5de76e823
SHA1 hash:
e521349d9e96a4191248747c42c78b6f88fc8f63
SH256 hash:
c3033ac711a2247331f03a52874b0f98b4726271c6a7ea4017ab2d044a1c6eea
MD5 hash:
116c8d48ed8c34b61adf731a28d66d75
SHA1 hash:
4b6d8bee02b33e7eafe3dbb0a032f992bece96e3
SH256 hash:
9269e43b4390850e2eb3078a91ccafae52e0ce8addc92bd331772817e770278e
MD5 hash:
99d9dafdf2859bb5a94f95534835fd4d
SHA1 hash:
05aaabbd60dcd89a488a0eecc3d9f6bf4ae79cab
Detections:
win_blacknet_rat_w0
SH256 hash:
7dc0f8b51db9be8635d1e2bacb7eb065931c37e21d7d057b6c2981905821fe5f
MD5 hash:
34c11ed96678b76adc7138c804f6c141
SHA1 hash:
f0c963e035393be463259ff45ad04949d1721a65
SH256 hash:
56e2fe0aa7b213e5f366494e20af3f3947c8de349a57e37f31067470d38b44aa
MD5 hash:
bc88ef36254e0d4b16b4b663664a1f44
SHA1 hash:
dbf93ac9c54a7fb76ee98530b5710a289a0830ba
Detections:
win_agent_tesla_g1
SH256 hash:
085b741dcfc91997f31b7c9c5c1834f902326175edd1d7375b0c854f04f8627f
MD5 hash:
681540cf3debb8e43654404566e8cbb9
SHA1 hash:
5a4be94b49fa19d112465df370edd7d28a273540
Detections:
win_agent_tesla_g1
SH256 hash:
9c32870bd9eb8b3d9bb332b3f9ee2c99ecf514000499676141fb504724440d40
MD5 hash:
3c271824b33cc69e11b802f707dc947d
SHA1 hash:
47ccaa9817865edc0fb29311868f7d627bd660a7
Detections:
win_agent_tesla_g1
SH256 hash:
d55800a825792f55999abdad199dfa54f3184417215a298910f2c12cd9cc31ee
MD5 hash:
bfb160a89f4a607a60464631ed3ed9fd
SHA1 hash:
1c981ef3eea8548a30e8d7bf8d0d61f9224288dd
SH256 hash:
6b123410a31a3f41f69f431bf407e3b6b40864ea71b88945135701f5a4a64f35
MD5 hash:
9f73c2894d9c727e8a797dd3497ab112
SHA1 hash:
bb365d71e89ccd61c708bf7abf40d00688a39be7
SH256 hash:
2d5e2831e24496bd74a7a2317f824657905cdadaeb00f5c6e33e9b75c5231a2f
MD5 hash:
a18b7cb1fe97912ffc3e38d76ccc0462
SHA1 hash:
c5908c111223d69f532973643381983ba385c1c1
Detections:
win_blacknet_rat_w0
SH256 hash:
4fcda5517e6673b3233c58d4738b079c6f944ce746dfc3b1dbf87f475f8ff364
MD5 hash:
4b71d55f16c4a497fb2457c340d5a8a6
SHA1 hash:
b8d17306aa1c757e6329bb69d976c224e585838a
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.