Analysis
-
max time kernel
4294181s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 12:29
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220113
General
-
Target
bilds.exe
-
Size
626KB
-
MD5
ae84bf01058b29c178ae724df445c0c8
-
SHA1
708700eed0aecab74a4198dd59ffc49fb81d4523
-
SHA256
3c5a8e9820b549a70a353997bbce4fe16956dbab22dedde2f358f0f10930cf44
-
SHA512
ebf382ceeb5b6be4ca65ac53cb56222cccc5c5b6f6e42e31cdfaa7963cc654f1e889ecc6d8be705a9d553a2229a4b250793d98e038b6c1e68609bab2c3c166c7
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 api.ipify.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 bilds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier bilds.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 bilds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1128 bilds.exe