General

  • Target

    b344cae600dfbd1b6128308fb5dd0902

  • Size

    1.7MB

  • Sample

    240304-2hnw7afe9s

  • MD5

    b344cae600dfbd1b6128308fb5dd0902

  • SHA1

    454e8ff06373b2faf985afd03faa68bfcf558b30

  • SHA256

    3baba0e5ac69f265b2b01a091ffd6a39b27c1cd897337d6dfe5bb08643c7c619

  • SHA512

    5404eb514b8d861dcc84577163bd0f861809e8bc53e2ca6444ff142263ab170b30de48d321ff17d293b51888269c954424cde31c170c39cc4c031693fc2c85b7

  • SSDEEP

    49152:ArxVV0DLYe8UTCEhVMrVKFJnSw46ezzkp5a4XAtF5ijsyU4Cof:KVVvLUGSWMvSw46eM5jXK+jsH

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1949371393:AAHUhcBi4jT-n7M-0jdnFN7sSCcZev8Wgv8/sendMessage?chat_id=578325291

Targets

    • Target

      b344cae600dfbd1b6128308fb5dd0902

    • Size

      1.7MB

    • MD5

      b344cae600dfbd1b6128308fb5dd0902

    • SHA1

      454e8ff06373b2faf985afd03faa68bfcf558b30

    • SHA256

      3baba0e5ac69f265b2b01a091ffd6a39b27c1cd897337d6dfe5bb08643c7c619

    • SHA512

      5404eb514b8d861dcc84577163bd0f861809e8bc53e2ca6444ff142263ab170b30de48d321ff17d293b51888269c954424cde31c170c39cc4c031693fc2c85b7

    • SSDEEP

      49152:ArxVV0DLYe8UTCEhVMrVKFJnSw46ezzkp5a4XAtF5ijsyU4Cof:KVVvLUGSWMvSw46eM5jXK+jsH

    • 44Caliber

      An open source infostealer written in C#.

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks