General
-
Target
v2.exe
-
Size
271KB
-
Sample
240103-p2cbaaffb3
-
MD5
85a93044109a70f1bb119d78966a2e4d
-
SHA1
7ecf238e536cf12fa3ff3e57b984f8f147c21266
-
SHA256
433b73b437ad4dd138d5a6a8cea12a4ff7bf93c2c9dc11844ab635b83638ebb8
-
SHA512
30656d405995e5dfc38bd6504463b7290b72f635b6773c1d58b116ee43f3afe0d14eae118139e43448446b6a0ffa4098bbec77ff8580b8df210b32ef1f522691
-
SSDEEP
6144:2mYKJMVRp9hnmy0UYU9B93YUnLbBa2X3Rb36h3oQ:tJ0Rp9hzL82ghYQ
Behavioral task
behavioral1
Sample
v2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
v2.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6694446290:AAHhatGdMQTZc2j8T6IAfes0OfC6QMBYYSg/sendMessage?chat_id=6485360129
Targets
-
-
Target
v2.exe
-
Size
271KB
-
MD5
85a93044109a70f1bb119d78966a2e4d
-
SHA1
7ecf238e536cf12fa3ff3e57b984f8f147c21266
-
SHA256
433b73b437ad4dd138d5a6a8cea12a4ff7bf93c2c9dc11844ab635b83638ebb8
-
SHA512
30656d405995e5dfc38bd6504463b7290b72f635b6773c1d58b116ee43f3afe0d14eae118139e43448446b6a0ffa4098bbec77ff8580b8df210b32ef1f522691
-
SSDEEP
6144:2mYKJMVRp9hnmy0UYU9B93YUnLbBa2X3Rb36h3oQ:tJ0Rp9hzL82ghYQ
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-