General

  • Target

    fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

  • Size

    271KB

  • MD5

    9f6a3708aefe70bc0dce3791933daa15

  • SHA1

    955d4199f1e6b4baa1505facbc706dd3f4f216e5

  • SHA256

    fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c

  • SHA512

    9e70cdc23bffd3e08a3efd848490ad591a1cd45aa7e9785c639f44af2282241b806a306dec0a1c6a8823d0d973709fa581638473ba9b402e9835d43d1dfc5edb

  • SSDEEP

    6144:VmYKJMVRp9hnmy0UYU9B93YUnLbB62X3Rb36h3BQ:uJ0Rp9hzL82ghRQ

Score
10/10

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6791527720:AAGAcaNpEBFqTzq72qgKaCrjniEEB3GQpKo/sendMessage?chat_id=1160270288

Signatures

  • Blackguard family
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Detects executables referencing Discord tokens regular expressions 1 IoCs
  • Detects executables referencing credit card regular expressions 1 IoCs
  • Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables using Telegram Chat Bot 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fe364ddbfe5b0fdd34ca1f2de1f901f8b1097ae9a4d0cee649d3a09e1c02518c
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections