Threat Database Backdoors Backdoor.Blackrain.A

Backdoor.Blackrain.A

By CagedTech in Backdoors

Threat Scorecard

Threat Level: 60 % (Medium)
Infected Computers: 5
First Seen: February 2, 2022
Last Seen: February 5, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.Blackrain.A
Packers: UPX
Signature status: No Signature

Known Samples

MD5: df87a63ebba0e09d8c5498415d294093
SHA1: d7f713ee11e7490febc3cb4d8dbb524e955c9a18
SHA256: 34350039BF0DBC13BC51A08B2C46B1B3BBD6DFCECFF1B2E0854B4C519190BC9A
File Size: 490.32 KB, 490320 bytes
MD5: 080d012ee6f84cbbef1532ec602286e8
SHA1: 3853f5c9fd65214919c4c6a8b338ebdc05deb6d7
SHA256: 1EE0556809BC1A2A470188D993D8BD1597D3BB8B87A3B07477B21DFC0F47F074
File Size: 467.28 KB, 467280 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments http://www.metaquotes.net
Company Name MetaQuotes Software Corp.
File Description Setup
File Version 5.0.0.1172
Internal Name Setup
Legal Copyright © 2001-2015, MetaQuotes Software Corp.
Legal Trademarks MetaTrader
Original Filename Setup
Product Name Setup
Product Version 5.0.0.1172

File Traits

  • 2+ executable sections
  • HighEntropy
  • Installer Version
  • packed
  • x86

Block Information

Total Blocks: 1,023
Potentially Malicious Blocks: 10
Whitelisted Blocks: 578
Unknown Blocks: 435

Visual Map

? 0 0 ? 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 x 0 0 0 0 ? 0 0 0 0 ? 0 0 ? 0 ? ? ? 0 0 0 0 0 0 0 ? 0 0 ? ? 0 ? ? 0 0 0 ? 0 0 ? x 0 0 0 0 0 0 ? 0 0 x 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 ? 0 ? ? 0 ? ? x 0 ? ? ? 0 0 ? 0 ? ? ? ? ? ? ? ? 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? 0 x 0 0 ? ? ? ? ? ? ? ? 0 0 ? ? ? 0 0 ? ? 0 0 ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? 0 ? 0 ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? 0 0 0 ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? 0 0 ? ? 0 0 ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 1 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 2 1 0 0 0 0 1 0 0 1 0 0 0 1 3 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 2 2 1 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 1 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 ? ? 0 ? ? ? ? ? ? ? ? ? 0 0 0 ? ? 0 ? 0 ? ? ? 0 ? ? ? ? ? ? 0 ? ? 0 ? 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? 0 ? 0 0 ? 0 0 x ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? 0 ? ? 0 ? 0 x ? 0 x ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? 0 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
\device\harddisk0\dr0 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\google\chrome\user data\default\pepper data\shockwave flash\writableroot\#sharedobjects Generic Write,Read Attributes
c:\users\user\appdata\roaming\macromedia\flash player\#sharedobjects Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\metaquotes software::id 058C6979-04A2-I RegNtPreCreateKey
HKLM\software\metaquotes software::id F9E38006-4827-I RegNtPreCreateKey

Windows API Usage

Category API
Network Winsock2
  • WSAStartup
Other Suspicious
  • AdjustTokenPrivileges
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Network Winhttp
  • WinHttpConnect
  • WinHttpOpen
  • WinHttpOpenRequest

Trending

Most Viewed

Loading...