General

  • Target

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe

  • Size

    456KB

  • Sample

    220317-htnwsabhh4

  • MD5

    0ce6472a1caf1e18f0c87c6f405c6441

  • SHA1

    d6f0f1a7cfb43cadeace56f7624e3ca91bb46b8f

  • SHA256

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b

  • SHA512

    5398f90b48a360f3ee4b8e5668f561fea209abdbdd426e58617d498257a4a204fb7a2687a771f1d907c3adee4b03511bb459ae6acec2401f6adf257a2e9be510

Malware Config

Extracted

Family

blackguard

C2

https://umpulumpu.ru/

Targets

    • Target

      db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe

    • Size

      456KB

    • MD5

      0ce6472a1caf1e18f0c87c6f405c6441

    • SHA1

      d6f0f1a7cfb43cadeace56f7624e3ca91bb46b8f

    • SHA256

      db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b

    • SHA512

      5398f90b48a360f3ee4b8e5668f561fea209abdbdd426e58617d498257a4a204fb7a2687a771f1d907c3adee4b03511bb459ae6acec2401f6adf257a2e9be510

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v6

Tasks