General
-
Target
EarchClient.exe
-
Size
271KB
-
Sample
240124-qlcsjsbcd8
-
MD5
5da1556702cf95395110889546f98886
-
SHA1
569150086d2c8de41c3dee34f0f174eed6323af4
-
SHA256
69fd483a470bb9964807d5a4f950904fba94240db50ebaf55173afadb5808d4b
-
SHA512
ea51c6ffeb31977f81644b501973368568cc8d033b45b5317ec61d9064495cd081d779362cbc4be4bf3244a7ab57d8e83f0531a40e7e67863fa7080d4d8cc3c3
-
SSDEEP
6144:fmYKOMivp9hnmy0UYU9C93YUnLbBazwF3ab36h3KE:oODvp9hiL8KLhaE
Behavioral task
behavioral1
Sample
EarchClient.exe
Resource
win11-20231222-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6278429099:AAEhx_7evnIrGcJ8BJVLnAHouu09FtlHjyQ/sendMessage?chat_id=1061483843
Targets
-
-
Target
EarchClient.exe
-
Size
271KB
-
MD5
5da1556702cf95395110889546f98886
-
SHA1
569150086d2c8de41c3dee34f0f174eed6323af4
-
SHA256
69fd483a470bb9964807d5a4f950904fba94240db50ebaf55173afadb5808d4b
-
SHA512
ea51c6ffeb31977f81644b501973368568cc8d033b45b5317ec61d9064495cd081d779362cbc4be4bf3244a7ab57d8e83f0531a40e7e67863fa7080d4d8cc3c3
-
SSDEEP
6144:fmYKOMivp9hnmy0UYU9C93YUnLbBazwF3ab36h3KE:oODvp9hiL8KLhaE
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-