General
-
Target
285f589cd4f3b4167b73302217555b93
-
Size
262KB
-
Sample
220601-jh4njaahcm
-
MD5
285f589cd4f3b4167b73302217555b93
-
SHA1
458de3a4ff0834382b68a0f7d4957af85e5c0587
-
SHA256
d977d952f6008c5eefeffb1eea129a8b274b3ae2ef3629fcca6994b283665509
-
SHA512
358883cc51bec4e670a84f0aff479d25ace16144666958551268326b898855c56375ba2bbcadd65f40f22be72818833546842a290de1c5b6f41243fc94dd15d3
Static task
static1
Behavioral task
behavioral1
Sample
285f589cd4f3b4167b73302217555b93.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
285f589cd4f3b4167b73302217555b93.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot5113210249:AAHdcRaqv7siBKm-_on8TiZJf_y0XMKlF7I/sendMessage?chat_id=909175584
Targets
-
-
Target
285f589cd4f3b4167b73302217555b93
-
Size
262KB
-
MD5
285f589cd4f3b4167b73302217555b93
-
SHA1
458de3a4ff0834382b68a0f7d4957af85e5c0587
-
SHA256
d977d952f6008c5eefeffb1eea129a8b274b3ae2ef3629fcca6994b283665509
-
SHA512
358883cc51bec4e670a84f0aff479d25ace16144666958551268326b898855c56375ba2bbcadd65f40f22be72818833546842a290de1c5b6f41243fc94dd15d3
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-