General

  • Target

    Loader.exe

  • Size

    273KB

  • Sample

    240618-scte2ssgpn

  • MD5

    20c1572e3522b3387e05074d4f5e19fc

  • SHA1

    b8bd0221456b3d933d3cdf225408e77bb0a62374

  • SHA256

    abc9f44b74bbd427025796c98425c5f10fe5d6272143601d59b0c0187c291900

  • SHA512

    a3b34ea5012e9cb6f1591484381619980b58ac74214eb700689433d5f69161d34e7f27388bf2cd7e59b7066e186486ecc59dc8223e5397daaba677b8d06d601f

  • SSDEEP

    6144:ef+BLtABPDM5pPTgxWGomsXSbklxLfdEzyIme0wa6:h57hmsXSkHdmme06

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      273KB

    • MD5

      20c1572e3522b3387e05074d4f5e19fc

    • SHA1

      b8bd0221456b3d933d3cdf225408e77bb0a62374

    • SHA256

      abc9f44b74bbd427025796c98425c5f10fe5d6272143601d59b0c0187c291900

    • SHA512

      a3b34ea5012e9cb6f1591484381619980b58ac74214eb700689433d5f69161d34e7f27388bf2cd7e59b7066e186486ecc59dc8223e5397daaba677b8d06d601f

    • SSDEEP

      6144:ef+BLtABPDM5pPTgxWGomsXSbklxLfdEzyIme0wa6:h57hmsXSkHdmme06

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks