General

  • Target

    3b4c449beb189f0825e16754103a4ab1

  • Size

    1.7MB

  • Sample

    231225-y9zafsbba3

  • MD5

    3b4c449beb189f0825e16754103a4ab1

  • SHA1

    53405948ae32606096dfce7ab63e9aa2c26c4f0a

  • SHA256

    02aad493c8daaca9ac8ebe11f072d1dc500aeb72ee2e3fcdd1ec4b1fc2a40bb1

  • SHA512

    092525e85563de7abeb55d4b728d488a2890c255363063e0c94b83c21f776978369334a541579b16f985801d8e280c8ce962fb805b387a9ed4dcfe580cc6f549

  • SSDEEP

    49152:65Paa0OScMGQg1Fsm+3GSky9kY/pKVYWuHiEc7J:CPa9OSRvmwky9kY/JHi7l

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1938169884:AAGbfbPPFVakdCHJgp_PIDvE8jD7mA52LB0/sendMessage?chat_id=1143386592

Targets

    • Target

      3b4c449beb189f0825e16754103a4ab1

    • Size

      1.7MB

    • MD5

      3b4c449beb189f0825e16754103a4ab1

    • SHA1

      53405948ae32606096dfce7ab63e9aa2c26c4f0a

    • SHA256

      02aad493c8daaca9ac8ebe11f072d1dc500aeb72ee2e3fcdd1ec4b1fc2a40bb1

    • SHA512

      092525e85563de7abeb55d4b728d488a2890c255363063e0c94b83c21f776978369334a541579b16f985801d8e280c8ce962fb805b387a9ed4dcfe580cc6f549

    • SSDEEP

      49152:65Paa0OScMGQg1Fsm+3GSky9kY/pKVYWuHiEc7J:CPa9OSRvmwky9kY/JHi7l

    • 44Caliber

      An open source infostealer written in C#.

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks