General

  • Target

    file.exe

  • Size

    3.9MB

  • Sample

    221102-1tcgvscba2

  • MD5

    3d5ec1d0d651df913d6148081a72acb9

  • SHA1

    66b1f6233e5e3c21977307bd526abebb5a1f5051

  • SHA256

    91380be57c9e845bd46ab84a966793a76de0fc4ee7022b52316930fe4f17281c

  • SHA512

    1213b49181cef1899122abf129e0f0c9f6807fa2b9ccce9963f7e9a49e330062d34cd7c9fff6d2b1d418ef8aeb29d86cd21c5cfb50cc12dc4e10d44e02349c13

  • SSDEEP

    98304:iNuSZTKA0t9FFPE0yr0V/YVrsk9N8ivyhAdsPSQxSBtq0f4:ubk9fcvAcVN8iNIS7Hqw

Malware Config

Extracted

Family

blackguard

C2

https://clinokrp.online

Targets

    • Target

      file.exe

    • Size

      3.9MB

    • MD5

      3d5ec1d0d651df913d6148081a72acb9

    • SHA1

      66b1f6233e5e3c21977307bd526abebb5a1f5051

    • SHA256

      91380be57c9e845bd46ab84a966793a76de0fc4ee7022b52316930fe4f17281c

    • SHA512

      1213b49181cef1899122abf129e0f0c9f6807fa2b9ccce9963f7e9a49e330062d34cd7c9fff6d2b1d418ef8aeb29d86cd21c5cfb50cc12dc4e10d44e02349c13

    • SSDEEP

      98304:iNuSZTKA0t9FFPE0yr0V/YVrsk9N8ivyhAdsPSQxSBtq0f4:ubk9fcvAcVN8iNIS7Hqw

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks