General

  • Target

    EarchClient.exe

  • Size

    271KB

  • Sample

    240124-qlcsjsbcd8

  • MD5

    5da1556702cf95395110889546f98886

  • SHA1

    569150086d2c8de41c3dee34f0f174eed6323af4

  • SHA256

    69fd483a470bb9964807d5a4f950904fba94240db50ebaf55173afadb5808d4b

  • SHA512

    ea51c6ffeb31977f81644b501973368568cc8d033b45b5317ec61d9064495cd081d779362cbc4be4bf3244a7ab57d8e83f0531a40e7e67863fa7080d4d8cc3c3

  • SSDEEP

    6144:fmYKOMivp9hnmy0UYU9C93YUnLbBazwF3ab36h3KE:oODvp9hiL8KLhaE

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6278429099:AAEhx_7evnIrGcJ8BJVLnAHouu09FtlHjyQ/sendMessage?chat_id=1061483843

Targets

    • Target

      EarchClient.exe

    • Size

      271KB

    • MD5

      5da1556702cf95395110889546f98886

    • SHA1

      569150086d2c8de41c3dee34f0f174eed6323af4

    • SHA256

      69fd483a470bb9964807d5a4f950904fba94240db50ebaf55173afadb5808d4b

    • SHA512

      ea51c6ffeb31977f81644b501973368568cc8d033b45b5317ec61d9064495cd081d779362cbc4be4bf3244a7ab57d8e83f0531a40e7e67863fa7080d4d8cc3c3

    • SSDEEP

      6144:fmYKOMivp9hnmy0UYU9C93YUnLbBazwF3ab36h3KE:oODvp9hiL8KLhaE

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks