General
-
Target
CINEQ-MULTITOOL_BP.rar
-
Size
19KB
-
Sample
220609-m7dp7abfe2
-
MD5
a24a2eeffea8f31ec2c073eb7ac24275
-
SHA1
23979a21d964cabe72cf3e505b66073e31831b76
-
SHA256
9cd8f7d58c0c1c43603fe968e30bd7ca29beeafb661eaa54a9a99f61bc17e7e9
-
SHA512
e91780e22dad108b5c0197ab076bb421f72e3bc4d08a92ef7277a144202653cc1b52e7b8294213f974413d595aecdce72181d8a327f1c4f2b915ddd3a17bb0ff
Static task
static1
Behavioral task
behavioral1
Sample
CINEQ-MULTITOOL BP.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
CINEQ-MULTITOOL BP.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/970421630524354651/CkpAgqkMq97-867i9HvP2siQIR6b7eFSQOEDfGCjplVXDq06C9FEM51jk-d8ZEjhXXZv
Targets
-
-
Target
CINEQ-MULTITOOL BP.exe
-
Size
73KB
-
MD5
98f5092452b85d8e6bb1ed96be8ae7ad
-
SHA1
2215f40a94491720415303b6720d8935bf2f484d
-
SHA256
41412896aee67de680e3264ad4a97efb4b5ea60002c4175089a0f0fdd23946ae
-
SHA512
8b2d2586a2638ffe4e40ea81c455b5395d6c3228950f06ea04fcf17238628cfd9a0a487f1f988b89a2482cbb2fe5a8c8ca7d3756762938bfe67cb3ce222367d1
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
suricata: ET MALWARE NightfallGT Mercurial Grabber
suricata: ET MALWARE NightfallGT Mercurial Grabber
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-