General

  • Target

    874dad172d7d4af0bab54a7a5b7dc6a7

  • Size

    1.7MB

  • Sample

    240201-thkkrsbdal

  • MD5

    874dad172d7d4af0bab54a7a5b7dc6a7

  • SHA1

    26917510b8f15642cf6ded5281ee4f364366ede1

  • SHA256

    d963729366502cb3aa25b180774331bbc36505388b9a88e18de5c1e31bb22c44

  • SHA512

    be2744820aad996309429fec956d04ffaa34deea3f539406d19a7ab8119948b5ddc90a4a7febb69cac8aefde164aaa6868c15d35932af0032784883e2195ea4c

  • SSDEEP

    49152:QtgXScc+ckmtEs4MMrb1NpN95VDLTwNAjg:9i+Xm2BMu/nX

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1942918979:AAFYbo4y_dydty9_QVi9q57Nc95ysGNQ3N0/sendMessage?chat_id=1346139054

Targets

    • Target

      874dad172d7d4af0bab54a7a5b7dc6a7

    • Size

      1.7MB

    • MD5

      874dad172d7d4af0bab54a7a5b7dc6a7

    • SHA1

      26917510b8f15642cf6ded5281ee4f364366ede1

    • SHA256

      d963729366502cb3aa25b180774331bbc36505388b9a88e18de5c1e31bb22c44

    • SHA512

      be2744820aad996309429fec956d04ffaa34deea3f539406d19a7ab8119948b5ddc90a4a7febb69cac8aefde164aaa6868c15d35932af0032784883e2195ea4c

    • SSDEEP

      49152:QtgXScc+ckmtEs4MMrb1NpN95VDLTwNAjg:9i+Xm2BMu/nX

    • 44Caliber

      An open source infostealer written in C#.

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks