General
-
Target
bilds.exe
-
Size
913KB
-
Sample
220306-pp2qeaccam
-
MD5
d835eb128f02d253cea88ae97c9da23a
-
SHA1
e4d89e12aa6adb085c44cbf2891c295b87006b83
-
SHA256
32f8a09555626bf7f6fd52a4b98df62bad118c30f9e1b49269db497961cc7cd9
-
SHA512
fa80e1344c604c2b455484a528db4df00732eacd0fc5556422767f8847a2e4da8f0e5170b6a3ab70394605ac724f9a37cd44db37809d9cbf034210681c07ec62
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Targets
-
-
Target
bilds.exe
-
Size
913KB
-
MD5
d835eb128f02d253cea88ae97c9da23a
-
SHA1
e4d89e12aa6adb085c44cbf2891c295b87006b83
-
SHA256
32f8a09555626bf7f6fd52a4b98df62bad118c30f9e1b49269db497961cc7cd9
-
SHA512
fa80e1344c604c2b455484a528db4df00732eacd0fc5556422767f8847a2e4da8f0e5170b6a3ab70394605ac724f9a37cd44db37809d9cbf034210681c07ec62
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-