General

  • Target

    285f589cd4f3b4167b73302217555b93

  • Size

    262KB

  • Sample

    220601-jh4njaahcm

  • MD5

    285f589cd4f3b4167b73302217555b93

  • SHA1

    458de3a4ff0834382b68a0f7d4957af85e5c0587

  • SHA256

    d977d952f6008c5eefeffb1eea129a8b274b3ae2ef3629fcca6994b283665509

  • SHA512

    358883cc51bec4e670a84f0aff479d25ace16144666958551268326b898855c56375ba2bbcadd65f40f22be72818833546842a290de1c5b6f41243fc94dd15d3

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot5113210249:AAHdcRaqv7siBKm-_on8TiZJf_y0XMKlF7I/sendMessage?chat_id=909175584

Targets

    • Target

      285f589cd4f3b4167b73302217555b93

    • Size

      262KB

    • MD5

      285f589cd4f3b4167b73302217555b93

    • SHA1

      458de3a4ff0834382b68a0f7d4957af85e5c0587

    • SHA256

      d977d952f6008c5eefeffb1eea129a8b274b3ae2ef3629fcca6994b283665509

    • SHA512

      358883cc51bec4e670a84f0aff479d25ace16144666958551268326b898855c56375ba2bbcadd65f40f22be72818833546842a290de1c5b6f41243fc94dd15d3

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks