General

  • Target

    New folder.7z

  • Size

    39.9MB

  • Sample

    241208-y99fesymcj

  • MD5

    8988dc64384813a1e98203df0af16479

  • SHA1

    a479c174501274f4fe33523bccc5d16ba1bbabaa

  • SHA256

    ae6f1c1d92203532d5791fc0ce79d837f18ed37f28be9924585ad227190b8cc2

  • SHA512

    f9e50c9188e0c154e83ef8f7943339b643934b1d4c827325181cf72ff559dd3b3d9ca26c70cf2762dbe894456bf34f1378380466bde737f90558c7fe10967905

  • SSDEEP

    786432:+vefN7PvWOz18ji1mRSxFEJWcL23szNOXDdpfJM4vRO7:+KNLWqqqELCoAXDdpfO7

Malware Config

Targets

    • Target

      New folder.7z

    • Size

      39.9MB

    • MD5

      8988dc64384813a1e98203df0af16479

    • SHA1

      a479c174501274f4fe33523bccc5d16ba1bbabaa

    • SHA256

      ae6f1c1d92203532d5791fc0ce79d837f18ed37f28be9924585ad227190b8cc2

    • SHA512

      f9e50c9188e0c154e83ef8f7943339b643934b1d4c827325181cf72ff559dd3b3d9ca26c70cf2762dbe894456bf34f1378380466bde737f90558c7fe10967905

    • SSDEEP

      786432:+vefN7PvWOz18ji1mRSxFEJWcL23szNOXDdpfJM4vRO7:+KNLWqqqELCoAXDdpfO7

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Blackguard family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks