General

  • Target

    abed42f95a78af86615234f9b1f0a3eb

  • Size

    10.5MB

  • Sample

    240228-p5f4msca8y

  • MD5

    abed42f95a78af86615234f9b1f0a3eb

  • SHA1

    7bcbeb1fa69be231e175548350af088c3188c6cf

  • SHA256

    6a0d05477e23fc1152067fc51d50a044bccf0e0a0654dbae1864df792400e935

  • SHA512

    d92ef10db67d5c9cb0f88e28dc96daabdec064a006bb833d715e68a357323a9fb9b424c9eb5623ddb9bc896e041525d0d26667982bfed9facb813fee3a6bb974

  • SSDEEP

    196608:Ta6gt5+l8xzTcQnBWxqRj0oeYW/uROmZq670LFx50EgKIZNjR07iM1s4N:+64dTXnBwe+2r5sOEgKClwfX

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1909916945:AAH0pLjSkBmQT4Vr_17-JSMoF4Lt_xOH9N8/sendMessage?chat_id=1640241476

Targets

    • Target

      abed42f95a78af86615234f9b1f0a3eb

    • Size

      10.5MB

    • MD5

      abed42f95a78af86615234f9b1f0a3eb

    • SHA1

      7bcbeb1fa69be231e175548350af088c3188c6cf

    • SHA256

      6a0d05477e23fc1152067fc51d50a044bccf0e0a0654dbae1864df792400e935

    • SHA512

      d92ef10db67d5c9cb0f88e28dc96daabdec064a006bb833d715e68a357323a9fb9b424c9eb5623ddb9bc896e041525d0d26667982bfed9facb813fee3a6bb974

    • SSDEEP

      196608:Ta6gt5+l8xzTcQnBWxqRj0oeYW/uROmZq670LFx50EgKIZNjR07iM1s4N:+64dTXnBwe+2r5sOEgKClwfX

    • BlackGuard

      Infostealer first seen in Late 2021.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks