General

  • Target

    05c2991a5ea29caa99dbf224aaf1cd4b5d3d88430118c6fd4d18d73130c54433

  • Size

    7.6MB

  • Sample

    230107-a5brlacd34

  • MD5

    4ecc21c7a2aadaf74dfac9e52723d41e

  • SHA1

    1e39e52aefb0b5c7fa16aaf9c9d870150482a4eb

  • SHA256

    05c2991a5ea29caa99dbf224aaf1cd4b5d3d88430118c6fd4d18d73130c54433

  • SHA512

    9273eed9eaea2638bfb310fa5ed84a0586512b7b85396fb5658e2eb06b7ab81b63cf615674cc4e32130d16a3e173e97b213b8423a5c0c025c36c04d274e85265

  • SSDEEP

    196608:Z0Xi4ZgUmPjE+Agbk9fcGVN8iNISGK71:yXiMgbj7AsGXiw

Malware Config

Extracted

Family

blackguard

C2

http://45.15.156.9

Targets

    • Target

      05c2991a5ea29caa99dbf224aaf1cd4b5d3d88430118c6fd4d18d73130c54433

    • Size

      7.6MB

    • MD5

      4ecc21c7a2aadaf74dfac9e52723d41e

    • SHA1

      1e39e52aefb0b5c7fa16aaf9c9d870150482a4eb

    • SHA256

      05c2991a5ea29caa99dbf224aaf1cd4b5d3d88430118c6fd4d18d73130c54433

    • SHA512

      9273eed9eaea2638bfb310fa5ed84a0586512b7b85396fb5658e2eb06b7ab81b63cf615674cc4e32130d16a3e173e97b213b8423a5c0c025c36c04d274e85265

    • SSDEEP

      196608:Z0Xi4ZgUmPjE+Agbk9fcGVN8iNISGK71:yXiMgbj7AsGXiw

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks