General

  • Target

    Nursuk.exe

  • Size

    7.7MB

  • Sample

    240403-rebgksee35

  • MD5

    54307c95f310be32416dc11dbbb0242d

  • SHA1

    973c4654fd62f99b69664b91a27ef662eff22530

  • SHA256

    96ce79bac646d87efa144f49cfec13754195d7d47a7e49b24ef471244156c94d

  • SHA512

    13d6ba8722ceb4eaa03a175d318174802be08e5c18422fe88361c27dd62bf05c21004499d3aee2ef81e2e7998aaa74c208aa0aa31158c5690955510ebe48ef4e

  • SSDEEP

    196608:VMy14ZAxwSac2VQUGC9FwUJQX/s1FpdpWgExmM6otTbljN6xxFWFx:VM84ZACSaNQ0UxXUvpGg+mM6otfwFWFx

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot7123530148:AAHl3H5MUg2knkBY6M5FShnUjYK740O7bwk/sendMessage?chat_id=6287236697

Targets

    • Target

      Nursuk.exe

    • Size

      7.7MB

    • MD5

      54307c95f310be32416dc11dbbb0242d

    • SHA1

      973c4654fd62f99b69664b91a27ef662eff22530

    • SHA256

      96ce79bac646d87efa144f49cfec13754195d7d47a7e49b24ef471244156c94d

    • SHA512

      13d6ba8722ceb4eaa03a175d318174802be08e5c18422fe88361c27dd62bf05c21004499d3aee2ef81e2e7998aaa74c208aa0aa31158c5690955510ebe48ef4e

    • SSDEEP

      196608:VMy14ZAxwSac2VQUGC9FwUJQX/s1FpdpWgExmM6otTbljN6xxFWFx:VM84ZACSaNQ0UxXUvpGg+mM6otfwFWFx

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks