General
-
Target
file_fdp..Scr
-
Size
4.4MB
-
Sample
240613-wrfz2sxemg
-
MD5
4bc83684b8e2a9050d44374b2fc1e45d
-
SHA1
00d390f567516249c0487d2eabd826dafa7a7b50
-
SHA256
81603495e06315bfb9fc1b8dadbeccad47524ac15084a9a3f25274f76fff7adf
-
SHA512
d914ca67a6fa7ebf66bd64ad088b59a6299e19c38aa3560076b6b91aa481d644dee4b652c0d7580c0f3c8c698f41f28531a0d8d2d11552d3edb7b5a407ea3569
-
SSDEEP
98304:gDQ3MPvsFGblKNIknSb7tFTGN5nxPVRaxxVoPHj3cs593:wwMPvs4gNDnyyZxPFHwM3
Static task
static1
Behavioral task
behavioral1
Sample
file_fdp..scr
Resource
win11-20240611-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6948010821:AAEJfl5iNgu_Z6rr2SH3SeV22wpex-Pltwo/sendMessage?chat_id=6841140670
Targets
-
-
Target
file_fdp..Scr
-
Size
4.4MB
-
MD5
4bc83684b8e2a9050d44374b2fc1e45d
-
SHA1
00d390f567516249c0487d2eabd826dafa7a7b50
-
SHA256
81603495e06315bfb9fc1b8dadbeccad47524ac15084a9a3f25274f76fff7adf
-
SHA512
d914ca67a6fa7ebf66bd64ad088b59a6299e19c38aa3560076b6b91aa481d644dee4b652c0d7580c0f3c8c698f41f28531a0d8d2d11552d3edb7b5a407ea3569
-
SSDEEP
98304:gDQ3MPvsFGblKNIknSb7tFTGN5nxPVRaxxVoPHj3cs593:wwMPvs4gNDnyyZxPFHwM3
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-