General

  • Target

    SharcHack (1234).zip

  • Size

    11.1MB

  • Sample

    250102-frjg6svlfw

  • MD5

    7e3e37c8db5cf752446788c098f4b21a

  • SHA1

    173ffd352114c6c365a79a66c9af7bf9a203578c

  • SHA256

    954f8e8d665f2c7712308dfc7bd71ae47bdc237599b9a13d77b902b4ca8b8884

  • SHA512

    82cec09c8f85059209da4fa846f954e1017500bcd69e95a72f1fc52b3327eb75492bb6773b57980f2fb76216a38f5a36e1fd0092c001eccfaccd4225c3b96e7a

  • SSDEEP

    196608:S4CfZLCO5+qKHiJ8jUyKPKFAZHf/XzrUjSXLyfENzDlanD2SJjLwPG5KMPoUKc12:SPCOjPzhPKFAZHfPzr5XUENAnqMjLwoE

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Targets

    • Target

      SharcHack.exe

    • Size

      11.4MB

    • MD5

      b8918284fa1e6f12d3341df417a34e49

    • SHA1

      c21af6f52d2a85cda67703ac284bff3d4300d019

    • SHA256

      7418a6094bcaae9522ddd3e12cf119b3baae673013975f6db44ebbee200e83c2

    • SHA512

      b710c1f98ad60160fe4a37fa11fe6dccaccce552c2119b16f9ab50bde932cec4198587d83b9d5bfcc369db5f346f54e37b98eed9dcd86e365ddb4ece1d81fb43

    • SSDEEP

      196608:v/wld79ht+j1M0mWZsE6+YASy10tyDRs8sdFlh+co976:v4ld752M096+YdUGyDRs8jco8

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Blackguard family

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks