General
-
Target
SharcHack (1234).zip
-
Size
11.1MB
-
Sample
250102-frjg6svlfw
-
MD5
7e3e37c8db5cf752446788c098f4b21a
-
SHA1
173ffd352114c6c365a79a66c9af7bf9a203578c
-
SHA256
954f8e8d665f2c7712308dfc7bd71ae47bdc237599b9a13d77b902b4ca8b8884
-
SHA512
82cec09c8f85059209da4fa846f954e1017500bcd69e95a72f1fc52b3327eb75492bb6773b57980f2fb76216a38f5a36e1fd0092c001eccfaccd4225c3b96e7a
-
SSDEEP
196608:S4CfZLCO5+qKHiJ8jUyKPKFAZHf/XzrUjSXLyfENzDlanD2SJjLwPG5KMPoUKc12:SPCOjPzhPKFAZHfPzr5XUENAnqMjLwoE
Static task
static1
Behavioral task
behavioral1
Sample
SharcHack.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021
Targets
-
-
Target
SharcHack.exe
-
Size
11.4MB
-
MD5
b8918284fa1e6f12d3341df417a34e49
-
SHA1
c21af6f52d2a85cda67703ac284bff3d4300d019
-
SHA256
7418a6094bcaae9522ddd3e12cf119b3baae673013975f6db44ebbee200e83c2
-
SHA512
b710c1f98ad60160fe4a37fa11fe6dccaccce552c2119b16f9ab50bde932cec4198587d83b9d5bfcc369db5f346f54e37b98eed9dcd86e365ddb4ece1d81fb43
-
SSDEEP
196608:v/wld79ht+j1M0mWZsE6+YASy10tyDRs8sdFlh+co976:v4ld752M096+YdUGyDRs8jco8
-
Blackguard family
-
Modifies security service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2