General

  • Target

    VegaHack_v2 (1234).zip

  • Size

    7.6MB

  • Sample

    250414-k2en7atkz5

  • MD5

    f5b57d1dfe92ba015ee18af241efb656

  • SHA1

    a89ffd7dbfebf2aa14443ba181c5862e81d959c0

  • SHA256

    455a83da420087ac60e53a6e1d84db0d988cb8fffd820ca9fc4deb9cd9c84789

  • SHA512

    8dccdafe33a6d85135b9195443b0eb8e116498aed56b474878a7b216074610273477b6067ad46b9f8f688b40430a0fe91c1f14f5a3a80e8378600f796127f9f6

  • SSDEEP

    98304:raKJxRoDwxukWX7F26GC/6+A4YlzApeeE8hVMR4iZiqqsVITrtmgSE9NBzfFot+:txecxRWX7xZYlzCe8abob/vpVFl

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Targets

    • Target

      VegaHack_v2.exe

    • Size

      7.7MB

    • MD5

      9f4f298bcf1d208bd3ce3907cfb28480

    • SHA1

      05c1cfde951306f8c6e9d484d3d88698c4419c62

    • SHA256

      bf7057293d871cac087daab42daf22c1737a1df6adc7b7963989658f3b65f4cc

    • SHA512

      4c763c3b6d4884f77083db5ccada59bc57803b3226294eff2ec3db8f2121ac01ee240b0e822cb090f5320ce40df545b477e323efabdbca31722731adc4b46806

    • SSDEEP

      98304:Rgl47z3Aldea5a/OhtJeq+4NK+dG7M0mWZsE6+YhU+dbkh4yiMP0Q:H/wld79ht+j1M0mWZsE6+YASy10Q

    • BlackGuard

      Infostealer first seen in Late 2021.

    • Blackguard family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks