General

  • Target

    16654542863.zip

  • Size

    1.2MB

  • Sample

    240416-l8seasfg47

  • MD5

    f42bdc1ed1ee3b7840b136478bd7c35f

  • SHA1

    04bdfd19543b259ac0fc4f6aac2528e6e42ec9f4

  • SHA256

    063c1f7e5b5b0bbe5f5a0b8b8f0e9bb010f72278ad55f8f1e84e3c2f16175f54

  • SHA512

    994bec322a918d01b8affdfa560b4b0a424b480eb4bf937fefa8a1f0f4e210688dcf09fc7743831b797fab937d52894aff12493aeed4021a2ea52751de0813b6

  • SSDEEP

    24576:xShA0IK5AlrvEl8uqDvWscIkYhL01tRMwqtBi2m11yTjE5dR:+IK50LTDQIRUMwOkyXE5dR

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot7057429288:AAHYl5_27YU1Yjmuj33WKOqLVSgYtq3n-8k/sendMessage?chat_id=6093769937

Targets

    • Target

      2f1db126393f9fac859569890bb05bf82a9ccc03a46e61d8eb0048d749948b80

    • Size

      1.2MB

    • MD5

      47c44d12d251014b6a8094b5537e9fe8

    • SHA1

      7183573e18f4cd5d88f098791782c4d174960618

    • SHA256

      2f1db126393f9fac859569890bb05bf82a9ccc03a46e61d8eb0048d749948b80

    • SHA512

      5c0e9473ba20f6f424bec839e7d1795f19ace8ce9a017c8ef051812873a9e9be903e1a1d524a95ad46c20ad8b14e9e4f748004114cd4311c01251d1782554792

    • SSDEEP

      24576:ZTXN0zCcPfOqygUl/Qs7exFQlWoC5Bi/r1+gqhKTEBhR86wdMCtMw4Im:VXGz/exZCxl5w/Rnqh/C6pCB

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks