Resubmissions

29-03-2022 22:33

220329-2ghzjsgchj 10

General

  • Target

    b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb

  • Size

    989KB

  • Sample

    220329-2ghzjsgchj

  • MD5

    118886bd493a37257b963fe26805f516

  • SHA1

    2f61fcbebaca2ffe7b41a63adefad83ec04fb94b

  • SHA256

    b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb

  • SHA512

    c3753e98a9e2a70fec6d9573c74c70af665e82b5234bfb4ba7fa9a4160b255c3fa2a1328e41ec3d7569bdbd02e078e84181007d4b8f7818c6acf9c67c1157628

Malware Config

Targets

    • Target

      b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb

    • Size

      989KB

    • MD5

      118886bd493a37257b963fe26805f516

    • SHA1

      2f61fcbebaca2ffe7b41a63adefad83ec04fb94b

    • SHA256

      b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb

    • SHA512

      c3753e98a9e2a70fec6d9573c74c70af665e82b5234bfb4ba7fa9a4160b255c3fa2a1328e41ec3d7569bdbd02e078e84181007d4b8f7818c6acf9c67c1157628

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks