General

  • Target

    d013f217195c38d4c65063ba7001c7e2bd2b131fa0e130e5f3814ea72f0dd91a.exe

  • Size

    72.8MB

  • Sample

    250131-e4h7haykew

  • MD5

    314b9dee510eca2dfa045520739e6734

  • SHA1

    853a1bd7edc947f437e67aabbd93f748d90e3975

  • SHA256

    d013f217195c38d4c65063ba7001c7e2bd2b131fa0e130e5f3814ea72f0dd91a

  • SHA512

    1fc4fcdc7cd3b26846ca7b641f0278a953313ec02f2053e704f32aff392ebf9c4d766aa5946f84f313012365959b2e4f158874f1d95104e6aaae927ed7e5984f

  • SSDEEP

    1572864:W6GSXPyRXckWqTaYh9iSZoX5si4I38THE0CYYOiPxR19jiw:hXPydnjTa+eGi4pTHEhYY1pnl

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Targets

    • Target

      d013f217195c38d4c65063ba7001c7e2bd2b131fa0e130e5f3814ea72f0dd91a.exe

    • Size

      72.8MB

    • MD5

      314b9dee510eca2dfa045520739e6734

    • SHA1

      853a1bd7edc947f437e67aabbd93f748d90e3975

    • SHA256

      d013f217195c38d4c65063ba7001c7e2bd2b131fa0e130e5f3814ea72f0dd91a

    • SHA512

      1fc4fcdc7cd3b26846ca7b641f0278a953313ec02f2053e704f32aff392ebf9c4d766aa5946f84f313012365959b2e4f158874f1d95104e6aaae927ed7e5984f

    • SSDEEP

      1572864:W6GSXPyRXckWqTaYh9iSZoX5si4I38THE0CYYOiPxR19jiw:hXPydnjTa+eGi4pTHEhYY1pnl

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Blackguard family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks