General

  • Target

    1dc5cd47accaaebf5be57878d43a2dc0

  • Size

    1.7MB

  • Sample

    231230-1tr8baaeg8

  • MD5

    1dc5cd47accaaebf5be57878d43a2dc0

  • SHA1

    908e07ba8c3e9760aa42746e67e5c66b3110bb11

  • SHA256

    2a6063c7a32ca6b06174935c64894c825b29eafbea54700c0bc0a6b64be186f4

  • SHA512

    f3b6d684da544da1cd0a8dea28dd5abd3a4ced524492ca03278e669daa21d1a52d36f967da4fb2a04c79068b04bd1ba03fa746282bf763156637f4eb5953b6a3

  • SSDEEP

    49152:cZ6rR44Nu+OkppJ+yoeTp3flodyZmFSykdoj9zgi4:cuR44NPpiuTp3floqmAx4q

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1910729667:AAHOpTkbYDLI9EqfJlZpo0NtC5va-gyAKbo/sendMessage?chat_id=1008805926

Targets

    • Target

      1dc5cd47accaaebf5be57878d43a2dc0

    • Size

      1.7MB

    • MD5

      1dc5cd47accaaebf5be57878d43a2dc0

    • SHA1

      908e07ba8c3e9760aa42746e67e5c66b3110bb11

    • SHA256

      2a6063c7a32ca6b06174935c64894c825b29eafbea54700c0bc0a6b64be186f4

    • SHA512

      f3b6d684da544da1cd0a8dea28dd5abd3a4ced524492ca03278e669daa21d1a52d36f967da4fb2a04c79068b04bd1ba03fa746282bf763156637f4eb5953b6a3

    • SSDEEP

      49152:cZ6rR44Nu+OkppJ+yoeTp3flodyZmFSykdoj9zgi4:cuR44NPpiuTp3floqmAx4q

    • 44Caliber

      An open source infostealer written in C#.

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks