General
-
Target
aimstar.exe
-
Size
7.7MB
-
Sample
240224-2fm7wagg4y
-
MD5
d7ec7f52738bcacf33d89fb8f1b84e19
-
SHA1
ffed31ec21b973ce896ff03020c972d1fdb18982
-
SHA256
636e70909dfc21703747ce167243327f31be31210107bfd865ad37a7b90e4720
-
SHA512
1128f33463d97e0218fb61c77891d07597d49df28cd322dcf5ac0e4af1be4e40d9e469ac02a98a1790eda433a6d250875e471d63c1040f8bc7cd021f4a4db370
-
SSDEEP
196608:Hi2odc8ACwKlRZFm2avkB0+lsFKKm5Ui+Luw/forAD:HBodbhjbaPcsFZNwAD
Static task
static1
Behavioral task
behavioral1
Sample
aimstar.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aimstar.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6983151793:AAHNg6Weep9RXr0xtID5GbMp4oUCYfsclrY/sendMessage?chat_id=6591851501
Targets
-
-
Target
aimstar.exe
-
Size
7.7MB
-
MD5
d7ec7f52738bcacf33d89fb8f1b84e19
-
SHA1
ffed31ec21b973ce896ff03020c972d1fdb18982
-
SHA256
636e70909dfc21703747ce167243327f31be31210107bfd865ad37a7b90e4720
-
SHA512
1128f33463d97e0218fb61c77891d07597d49df28cd322dcf5ac0e4af1be4e40d9e469ac02a98a1790eda433a6d250875e471d63c1040f8bc7cd021f4a4db370
-
SSDEEP
196608:Hi2odc8ACwKlRZFm2avkB0+lsFKKm5Ui+Luw/forAD:HBodbhjbaPcsFZNwAD
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-