General

  • Target

    edda982bfd8986d01a3b5e005e5755ca

  • Size

    246KB

  • Sample

    231222-twddlsfcgp

  • MD5

    edda982bfd8986d01a3b5e005e5755ca

  • SHA1

    68cbb8e9965fae9da6afba41dd600190755efe35

  • SHA256

    10b86a89f56513268e5094837990648fec44b1ddf3f2f2c959dc23f6a4d8c630

  • SHA512

    1309b7096e7e4733a036e4093ec28c9477ced09da85fffb838998a50354d9742b5cdef3b785ed1f74c107d51d0fc8d5e3b0160251cb14b54bd78aab696c91df1

  • SSDEEP

    6144:vKSTkgWAlEC9R9+EWj2JH/OkNfKjbvWCeQWJ:zYgWAl7AjEfXKmCVWJ

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1711224512:AAG22Nlr-jO4MyOqR-e8u_WyFQ4Bw7rDtVw/sendMessage?chat_id=1640241476

Targets

    • Target

      edda982bfd8986d01a3b5e005e5755ca

    • Size

      246KB

    • MD5

      edda982bfd8986d01a3b5e005e5755ca

    • SHA1

      68cbb8e9965fae9da6afba41dd600190755efe35

    • SHA256

      10b86a89f56513268e5094837990648fec44b1ddf3f2f2c959dc23f6a4d8c630

    • SHA512

      1309b7096e7e4733a036e4093ec28c9477ced09da85fffb838998a50354d9742b5cdef3b785ed1f74c107d51d0fc8d5e3b0160251cb14b54bd78aab696c91df1

    • SSDEEP

      6144:vKSTkgWAlEC9R9+EWj2JH/OkNfKjbvWCeQWJ:zYgWAl7AjEfXKmCVWJ

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks