General

  • Target

    fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

  • Size

    271KB

  • Sample

    240307-bpx6bscg96

  • MD5

    9f6a3708aefe70bc0dce3791933daa15

  • SHA1

    955d4199f1e6b4baa1505facbc706dd3f4f216e5

  • SHA256

    fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

  • SHA512

    9e70cdc23bffd3e08a3efd848490ad591a1cd45aa7e9785c639f44af2282241b806a306dec0a1c6a8823d0d973709fa581638473ba9b402e9835d43d1dfc5edb

  • SSDEEP

    6144:VmYKJMVRp9hnmy0UYU9B93YUnLbB62X3Rb36h3BQ:uJ0Rp9hzL82ghRQ

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6791527720:AAGAcaNpEBFqTzq72qgKaCrjniEEB3GQpKo/sendMessage?chat_id=1160270288

Targets

    • Target

      fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

    • Size

      271KB

    • MD5

      9f6a3708aefe70bc0dce3791933daa15

    • SHA1

      955d4199f1e6b4baa1505facbc706dd3f4f216e5

    • SHA256

      fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

    • SHA512

      9e70cdc23bffd3e08a3efd848490ad591a1cd45aa7e9785c639f44af2282241b806a306dec0a1c6a8823d0d973709fa581638473ba9b402e9835d43d1dfc5edb

    • SSDEEP

      6144:VmYKJMVRp9hnmy0UYU9B93YUnLbB62X3Rb36h3BQ:uJ0Rp9hzL82ghRQ

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables referencing Discord tokens regular expressions

    • Detects executables referencing credit card regular expressions

    • Detects executables referencing many VPN software clients. Observed in infosteslers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables using Telegram Chat Bot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks