General

  • Target

    rtyDtrtfgass.exe

  • Size

    964KB

  • Sample

    220306-pvmhnsaec8

  • MD5

    76f95035b61727eb2a4719781b163b04

  • SHA1

    9571a8e284753f13c058d56d097ddb5b6d3555ea

  • SHA256

    352c936eaf45ffd2f99ba2a9e726eaa39af29d4c37a6ad5106849f07aa35896c

  • SHA512

    dc5766aff3997f7e48886f5b47c0759eaa0972aa5a3f90405703366bfecafc0f99c4e762e108c021892345d0181f3c3aed705b0aff09ab788b56f1a193efc035

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Targets

    • Target

      rtyDtrtfgass.exe

    • Size

      964KB

    • MD5

      76f95035b61727eb2a4719781b163b04

    • SHA1

      9571a8e284753f13c058d56d097ddb5b6d3555ea

    • SHA256

      352c936eaf45ffd2f99ba2a9e726eaa39af29d4c37a6ad5106849f07aa35896c

    • SHA512

      dc5766aff3997f7e48886f5b47c0759eaa0972aa5a3f90405703366bfecafc0f99c4e762e108c021892345d0181f3c3aed705b0aff09ab788b56f1a193efc035

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks