General

  • Target

    bilds.exe

  • Size

    913KB

  • Sample

    220306-pp2qeaccam

  • MD5

    d835eb128f02d253cea88ae97c9da23a

  • SHA1

    e4d89e12aa6adb085c44cbf2891c295b87006b83

  • SHA256

    32f8a09555626bf7f6fd52a4b98df62bad118c30f9e1b49269db497961cc7cd9

  • SHA512

    fa80e1344c604c2b455484a528db4df00732eacd0fc5556422767f8847a2e4da8f0e5170b6a3ab70394605ac724f9a37cd44db37809d9cbf034210681c07ec62

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Targets

    • Target

      bilds.exe

    • Size

      913KB

    • MD5

      d835eb128f02d253cea88ae97c9da23a

    • SHA1

      e4d89e12aa6adb085c44cbf2891c295b87006b83

    • SHA256

      32f8a09555626bf7f6fd52a4b98df62bad118c30f9e1b49269db497961cc7cd9

    • SHA512

      fa80e1344c604c2b455484a528db4df00732eacd0fc5556422767f8847a2e4da8f0e5170b6a3ab70394605ac724f9a37cd44db37809d9cbf034210681c07ec62

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks