MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e85dd1e7ab0b26928c8f917ff0849e745d975c97a9391171ea7218983e441eb3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlackNET


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: e85dd1e7ab0b26928c8f917ff0849e745d975c97a9391171ea7218983e441eb3
SHA3-384 hash: 2b06c3436d1f96f4684b80113bc46c7bd162ba326f42d0509eff139ba3d2963c6998bda913abdddb9040bca36491b462
SHA1 hash: fa4c651866f3ddbbeca98f5c3472d1c963700822
MD5 hash: 38461cc4e383b3cfdefd41e987df1927
humanhash: nebraska-kitten-washington-south
File name:Win_Updates.exe
Download: download sample
Signature BlackNET
File size:134'144 bytes
First seen:2020-09-17 14:13:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 1536:GW27RutYPWEBjRqqv0XvZVdmUqkbv49FusLT09s7MzhLbbATOX1A/1uh1T:Wn0XvjdCkbvCFnVM8Nu7
Threatray 6 similar samples on MalwareBazaar
TLSH CCD394122ADE1458E3BF8FB07FF5B5EE8A7AFD231516E5AD048102490B72B41ED01B76
Reporter James_inthe_box
Tags:BlackNet exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Threat name:
BlackNET
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected BlackNET
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 287012 Sample: Win_Updates.exe Startdate: 17/09/2020 Architecture: WINDOWS Score: 100 47 Antivirus detection for dropped file 2->47 49 Antivirus / Scanner detection for submitted sample 2->49 51 Multi AV Scanner detection for dropped file 2->51 53 7 other signatures 2->53 7 Win_Updates.exe 15 12 2->7         started        12 Win_Updates.exe 2->12         started        14 Win_Updates.exe 2->14         started        process3 dnsIp4 45 nicurb.com 104.27.134.41, 443, 49732 CLOUDFLARENETUS United States 7->45 33 C:\Users\user\Desktop\svchosts.exe, PE32 7->33 dropped 35 C:\Users\user\AppData\...\WindowsUpdates.exe, PE32 7->35 dropped 37 C:\...\WindowsUpdates.exe:Zone.Identifier, ASCII 7->37 dropped 39 C:\Users\user\AppData\...\Win_Updates.exe.log, ASCII 7->39 dropped 63 Detected unpacking (overwrites its own PE header) 7->63 16 WindowsUpdates.exe 14 5 7->16         started        21 svchosts.exe 3 7->21         started        file5 signatures6 process7 dnsIp8 41 172.67.214.142, 443, 49739 CLOUDFLARENETUS United States 16->41 43 nicurb.com 16->43 31 C:\Users\user\AppData\Local\...\svchosts.exe, PE32 16->31 dropped 55 Antivirus detection for dropped file 16->55 57 Multi AV Scanner detection for dropped file 16->57 59 Machine Learning detection for dropped file 16->59 61 Creates autostart registry keys with suspicious names 16->61 23 Win_Updates.exe 21->23         started        25 Win_Updates.exe 21->25         started        27 Win_Updates.exe 21->27         started        29 4 other processes 21->29 file9 signatures10 process11
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-09-17 14:13:51 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Contains code to disable Windows Defender
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BlackWorm
Author:Brian Wallace @botnet_hunter
Description:Identify BlackWorm
Rule name:SUSP_Modified_SystemExeFileName_in_File
Author:Florian Roth
Description:Detecst a variant of a system file name often used by attackers to cloak their activity
Reference:https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments