General

  • Target

    v2.exe

  • Size

    271KB

  • Sample

    240103-p2cbaaffb3

  • MD5

    85a93044109a70f1bb119d78966a2e4d

  • SHA1

    7ecf238e536cf12fa3ff3e57b984f8f147c21266

  • SHA256

    433b73b437ad4dd138d5a6a8cea12a4ff7bf93c2c9dc11844ab635b83638ebb8

  • SHA512

    30656d405995e5dfc38bd6504463b7290b72f635b6773c1d58b116ee43f3afe0d14eae118139e43448446b6a0ffa4098bbec77ff8580b8df210b32ef1f522691

  • SSDEEP

    6144:2mYKJMVRp9hnmy0UYU9B93YUnLbBa2X3Rb36h3oQ:tJ0Rp9hzL82ghYQ

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6694446290:AAHhatGdMQTZc2j8T6IAfes0OfC6QMBYYSg/sendMessage?chat_id=6485360129

Targets

    • Target

      v2.exe

    • Size

      271KB

    • MD5

      85a93044109a70f1bb119d78966a2e4d

    • SHA1

      7ecf238e536cf12fa3ff3e57b984f8f147c21266

    • SHA256

      433b73b437ad4dd138d5a6a8cea12a4ff7bf93c2c9dc11844ab635b83638ebb8

    • SHA512

      30656d405995e5dfc38bd6504463b7290b72f635b6773c1d58b116ee43f3afe0d14eae118139e43448446b6a0ffa4098bbec77ff8580b8df210b32ef1f522691

    • SSDEEP

      6144:2mYKJMVRp9hnmy0UYU9B93YUnLbBa2X3Rb36h3oQ:tJ0Rp9hzL82ghYQ

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks