Resubmissions

03-01-2024 12:33

240103-prfkysfef9 10

02-01-2024 23:31

240102-3hxd1aedb9 10

General

  • Target

    Domashka.7z

  • Size

    7.3MB

  • Sample

    240103-prfkysfef9

  • MD5

    ea3be0965ada906ae4d7fec3c53b7c9e

  • SHA1

    37273b2b1b3c622b61fb6db273e3c21fb5967e62

  • SHA256

    b67650cdc6cf635ca616302f292c2054fb51739b8a59dc81f3f1ca69f43b0f04

  • SHA512

    cd580d11d75be92440cbfdd5e9df98ecc27780aa8c81c6072645e09cb13fcdc3609e05fdf13ed133bdbc868112c5865640906aa0a11027ce9729502340f1e619

  • SSDEEP

    196608:aB9nzcP0ruW/e/nNsgRdKXdnR+Lc/ctHZfY7KSl2S/VOL:aByiuW/QnNsgXEnGcW5fmKh4Vy

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6694446290:AAHhatGdMQTZc2j8T6IAfes0OfC6QMBYYSg/sendMessage?chat_id=6485360129

Targets

    • Target

      Domashka.exe

    • Size

      7.7MB

    • MD5

      86e863875266e8345097c29d15741a8b

    • SHA1

      ab5524d7f698de5928397f3506645ba952103e4a

    • SHA256

      bb5d7edc909a7ea29836a501dddd5244d33d342ec6f75c1cf201f14ed55802ac

    • SHA512

      22528bbe743825dbfb09743d2824ad5220125e3240bd4d0bd2f87bdc7d46a259aebc08a6fc2e75d6119d881742348fcde90e05142eaa4f29d9c2bbe88f2ae8d5

    • SSDEEP

      196608:lX5lladq1hZvawTVNi1Fg6rTSGRzyEjNoi5d7nWO7:lHq6vFTIFg63R5j2E7nWG

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks