General
-
Target
bilds.exe
-
Size
626KB
-
Sample
220306-pnw4jaccal
-
MD5
ae84bf01058b29c178ae724df445c0c8
-
SHA1
708700eed0aecab74a4198dd59ffc49fb81d4523
-
SHA256
3c5a8e9820b549a70a353997bbce4fe16956dbab22dedde2f358f0f10930cf44
-
SHA512
ebf382ceeb5b6be4ca65ac53cb56222cccc5c5b6f6e42e31cdfaa7963cc654f1e889ecc6d8be705a9d553a2229a4b250793d98e038b6c1e68609bab2c3c166c7
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Targets
-
-
Target
bilds.exe
-
Size
626KB
-
MD5
ae84bf01058b29c178ae724df445c0c8
-
SHA1
708700eed0aecab74a4198dd59ffc49fb81d4523
-
SHA256
3c5a8e9820b549a70a353997bbce4fe16956dbab22dedde2f358f0f10930cf44
-
SHA512
ebf382ceeb5b6be4ca65ac53cb56222cccc5c5b6f6e42e31cdfaa7963cc654f1e889ecc6d8be705a9d553a2229a4b250793d98e038b6c1e68609bab2c3c166c7
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-