General
-
Target
New folder.7z
-
Size
39.9MB
-
Sample
241208-y99fesymcj
-
MD5
8988dc64384813a1e98203df0af16479
-
SHA1
a479c174501274f4fe33523bccc5d16ba1bbabaa
-
SHA256
ae6f1c1d92203532d5791fc0ce79d837f18ed37f28be9924585ad227190b8cc2
-
SHA512
f9e50c9188e0c154e83ef8f7943339b643934b1d4c827325181cf72ff559dd3b3d9ca26c70cf2762dbe894456bf34f1378380466bde737f90558c7fe10967905
-
SSDEEP
786432:+vefN7PvWOz18ji1mRSxFEJWcL23szNOXDdpfJM4vRO7:+KNLWqqqELCoAXDdpfO7
Static task
static1
Behavioral task
behavioral1
Sample
New folder.7z
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
New folder.7z
-
Size
39.9MB
-
MD5
8988dc64384813a1e98203df0af16479
-
SHA1
a479c174501274f4fe33523bccc5d16ba1bbabaa
-
SHA256
ae6f1c1d92203532d5791fc0ce79d837f18ed37f28be9924585ad227190b8cc2
-
SHA512
f9e50c9188e0c154e83ef8f7943339b643934b1d4c827325181cf72ff559dd3b3d9ca26c70cf2762dbe894456bf34f1378380466bde737f90558c7fe10967905
-
SSDEEP
786432:+vefN7PvWOz18ji1mRSxFEJWcL23szNOXDdpfJM4vRO7:+KNLWqqqELCoAXDdpfO7
Score10/10-
Blackguard family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2