General

  • Target

    bilds.exe

  • Size

    1.1MB

  • Sample

    220306-pqmmwaaec4

  • MD5

    7cadb3d6d6581c2bc3642653b9286b71

  • SHA1

    ee3a164339db9e2441c035932ae382150f489fb1

  • SHA256

    5293c26f29b4af6bc2f3f74ae1ed93537e6c311a695cc0a6920a635c57383617

  • SHA512

    db01f9fd60532d121f493c9746dd846e220d8bb110b2bde52655f61a52d0b648f1bb28c7eda4d4c4ccc1066a0b77f7f476f4b558bde11d419abc6aed82f221e1

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Targets

    • Target

      bilds.exe

    • Size

      1.1MB

    • MD5

      7cadb3d6d6581c2bc3642653b9286b71

    • SHA1

      ee3a164339db9e2441c035932ae382150f489fb1

    • SHA256

      5293c26f29b4af6bc2f3f74ae1ed93537e6c311a695cc0a6920a635c57383617

    • SHA512

      db01f9fd60532d121f493c9746dd846e220d8bb110b2bde52655f61a52d0b648f1bb28c7eda4d4c4ccc1066a0b77f7f476f4b558bde11d419abc6aed82f221e1

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks