General
-
Target
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743
-
Size
4.1MB
-
Sample
240613-yrtbgsygme
-
MD5
089319196a1eb3954487ef27534fac37
-
SHA1
9b78cc3e90ffaad1d4a772e414fee118b073c100
-
SHA256
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743
-
SHA512
c4bd1b6cc0a5f5d74ec15fc692e236c7d154ef5df54b48ed7c738c6c8aabc447cf98517c1375d4122ad802e7fbb7162837b4953e36e61867621c88cfe6c6141b
-
SSDEEP
98304:uKZ1fFm44CeqdSpvTJ8kB1PHG4hKvQJXiurAGm8Nrmz9HT6qHdy6R:uY1fFm4LSpV88nKvURMGmiiBHT9Hd5
Static task
static1
Behavioral task
behavioral1
Sample
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot7347084755:AAEPo6bIaWPl296sTBL5-HwHaIzcmHBRavo/sendMessage?chat_id=1880548751
Targets
-
-
Target
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743
-
Size
4.1MB
-
MD5
089319196a1eb3954487ef27534fac37
-
SHA1
9b78cc3e90ffaad1d4a772e414fee118b073c100
-
SHA256
1acff996f30eca03412658e634931fd8f0d2cf1789f3938426db68d5f52f2743
-
SHA512
c4bd1b6cc0a5f5d74ec15fc692e236c7d154ef5df54b48ed7c738c6c8aabc447cf98517c1375d4122ad802e7fbb7162837b4953e36e61867621c88cfe6c6141b
-
SSDEEP
98304:uKZ1fFm44CeqdSpvTJ8kB1PHG4hKvQJXiurAGm8Nrmz9HT6qHdy6R:uY1fFm4LSpV88nKvURMGmiiBHT9Hd5
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing Discord tokens regular expressions
-
Detects executables referencing credit card regular expressions
-
Detects executables referencing many VPN software clients. Observed in infosteslers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables using Telegram Chat Bot
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-