General

  • Target

    buijp.exe

  • Size

    1.5MB

  • Sample

    220306-n1r5nsadh6

  • MD5

    d9dd93dbce60481ae945dd6b9ba3e830

  • SHA1

    a01dd4dbe77a99de0cdcc3c2830641ff79a2d892

  • SHA256

    c1237d0e517abc7cd15bb55110196247b1f6ec397c28b8b2bdfba86dc5c8805f

  • SHA512

    8c48538a643fef1811689af9a893527776c501e9ed40223528ab80901be2a182f326c0be13dcfe1e30f14f69f77323ab8138728bc3ef4ae77c40e17a1c505c46

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot5000057429:AAGzxzARC3DPcOsfaw0jKHEyHfyEfZqVYQM/sendMessage?chat_id=1283089701

Targets

    • Target

      buijp.exe

    • Size

      1.5MB

    • MD5

      d9dd93dbce60481ae945dd6b9ba3e830

    • SHA1

      a01dd4dbe77a99de0cdcc3c2830641ff79a2d892

    • SHA256

      c1237d0e517abc7cd15bb55110196247b1f6ec397c28b8b2bdfba86dc5c8805f

    • SHA512

      8c48538a643fef1811689af9a893527776c501e9ed40223528ab80901be2a182f326c0be13dcfe1e30f14f69f77323ab8138728bc3ef4ae77c40e17a1c505c46

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks