General

  • Target

    https://oxy.st/d/HkPh

  • Sample

    240430-wyhr8acg8s

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot7040865500:AAGv0fUPRFYvSE3hfLhtEYclysjuwlLIuWI/sendMessage?chat_id=1326846656

Targets

    • Target

      https://oxy.st/d/HkPh

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks