General

  • Target

    08c1b360ad5f727a0660adfa74bd7509.bin

  • Size

    98KB

  • Sample

    230225-bcsebabe76

  • MD5

    d12a91616999e1b473893b2dc36ed1af

  • SHA1

    23d89f07f37bbc54f57c5797ccd70a7aa05a84d4

  • SHA256

    cbf36c0b3ee45c39dc04c9faa807dfb819dc049e60b6b5282d2ea4cc0a8c717f

  • SHA512

    10079adc4cbc1a1fe8580a6af3abd029f47d78776851a15b313df027a0fb53833f63fde0f33aaabf739f5e87fd2e47d4b7e916064206267e3c960d3012ab6065

  • SSDEEP

    3072:RNZIsY2JmJXhaVLgSM4uYVHxk7MrX+63Sp:jZIs/JmRhaebMyYrX+p

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot5973155151:AAGgQ2GQ_WZVdt1bf_ib5JEZozBNQ7N52ww/sendMessage?chat_id=1870895902

Targets

    • Target

      18c5f62d2fff0705013b83fc5c5c09ad7b9faeddac4bf4c8f2b5bb532f9488de.exe

    • Size

      237KB

    • MD5

      08c1b360ad5f727a0660adfa74bd7509

    • SHA1

      43a8d5a55f858ac67b195d2ebebc4ea498686f38

    • SHA256

      18c5f62d2fff0705013b83fc5c5c09ad7b9faeddac4bf4c8f2b5bb532f9488de

    • SHA512

      9c80b9f3ef2152e391222fb2a88d3d14d1bdfe6de256cf2659282dcc16cf0ff0d27f82500446c3e7375a481a47d39a0aad3d4f8e805dfe67b8e126c75253cfcd

    • SSDEEP

      3072:L5IAyZvNOYWO3bAfFFHjBl+Bl2K4eqibSE6czFKJLQPeI/Kh73WmqcSCJLeKgh2B:iAyZvHWbTH1l6RDbDjkIpbs

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks