General
-
Target
Mercurial.exe
-
Size
3.2MB
-
Sample
220212-t9d73achg2
-
MD5
2168322c604dda24529ab10ffb63603c
-
SHA1
325b8e0a7a13a5b6b2d13cb4a796c05f97ee9d12
-
SHA256
b80585a92881aeed921c96d6e8e16ce7eb6e195d1f9a0ddc1a5c6bb8e3585646
-
SHA512
85b00c8a77048d5175ac99b2172c4a4c6b4348013ca419c723d20dfcedc6e2bafde1cad4ab41897ef7892112108888763881215650a6cb32fdb01a9cfde99564
Static task
static1
Behavioral task
behavioral1
Sample
Mercurial.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Mercurial.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/939772339271385098/pb40yymlaC36gJ9lrIZE64Tin0HhFVa5fet-muKugdctzZ9wq34Ecu9RIjcsTOKwswvD
Targets
-
-
Target
Mercurial.exe
-
Size
3.2MB
-
MD5
2168322c604dda24529ab10ffb63603c
-
SHA1
325b8e0a7a13a5b6b2d13cb4a796c05f97ee9d12
-
SHA256
b80585a92881aeed921c96d6e8e16ce7eb6e195d1f9a0ddc1a5c6bb8e3585646
-
SHA512
85b00c8a77048d5175ac99b2172c4a4c6b4348013ca419c723d20dfcedc6e2bafde1cad4ab41897ef7892112108888763881215650a6cb32fdb01a9cfde99564
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Looks for VirtualBox Guest Additions in registry
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-