General
-
Target
VegaHack_v2 (1234).zip
-
Size
7.6MB
-
Sample
250414-k2en7atkz5
-
MD5
f5b57d1dfe92ba015ee18af241efb656
-
SHA1
a89ffd7dbfebf2aa14443ba181c5862e81d959c0
-
SHA256
455a83da420087ac60e53a6e1d84db0d988cb8fffd820ca9fc4deb9cd9c84789
-
SHA512
8dccdafe33a6d85135b9195443b0eb8e116498aed56b474878a7b216074610273477b6067ad46b9f8f688b40430a0fe91c1f14f5a3a80e8378600f796127f9f6
-
SSDEEP
98304:raKJxRoDwxukWX7F26GC/6+A4YlzApeeE8hVMR4iZiqqsVITrtmgSE9NBzfFot+:txecxRWX7xZYlzCe8abob/vpVFl
Static task
static1
Behavioral task
behavioral1
Sample
VegaHack_v2.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021
Targets
-
-
Target
VegaHack_v2.exe
-
Size
7.7MB
-
MD5
9f4f298bcf1d208bd3ce3907cfb28480
-
SHA1
05c1cfde951306f8c6e9d484d3d88698c4419c62
-
SHA256
bf7057293d871cac087daab42daf22c1737a1df6adc7b7963989658f3b65f4cc
-
SHA512
4c763c3b6d4884f77083db5ccada59bc57803b3226294eff2ec3db8f2121ac01ee240b0e822cb090f5320ce40df545b477e323efabdbca31722731adc4b46806
-
SSDEEP
98304:Rgl47z3Aldea5a/OhtJeq+4NK+dG7M0mWZsE6+YhU+dbkh4yiMP0Q:H/wld79ht+j1M0mWZsE6+YASy10Q
Score10/10-
Blackguard family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2