General

  • Target

    dawmcro.exe

  • Size

    42KB

  • Sample

    220825-l4e86scca5

  • MD5

    20fdace2b2e31d703355e8cb67ff6fbd

  • SHA1

    f0edc5f4844b2ede8815d9d800a5a5d870226a7d

  • SHA256

    7890dd5b3323bd32f21aea8f61343a1d7b5d487f6d9081b4566051e428a58379

  • SHA512

    9049a0c7c8172e43a560268140f8340c3dc3101c2b9a8e44bc7fb78b6a02608f1fb9e6fcbdf1d20e6798b2ef6f2e0fedda3c8ed1fb2eb7148749202fa56ba257

  • SSDEEP

    768:B+m6ERp2NGFpuZYNLsWTjCKZKfgm3EhyM:BRpAGXLsWT+F7EgM

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/971211548544618506/14fNrE_WgfMdX-C1GRaEBZFXaq4YJP6FiYBNoZBmzVXQtH76hGEshw8B-Tczk-M6JPkm

Targets

    • Target

      dawmcro.exe

    • Size

      42KB

    • MD5

      20fdace2b2e31d703355e8cb67ff6fbd

    • SHA1

      f0edc5f4844b2ede8815d9d800a5a5d870226a7d

    • SHA256

      7890dd5b3323bd32f21aea8f61343a1d7b5d487f6d9081b4566051e428a58379

    • SHA512

      9049a0c7c8172e43a560268140f8340c3dc3101c2b9a8e44bc7fb78b6a02608f1fb9e6fcbdf1d20e6798b2ef6f2e0fedda3c8ed1fb2eb7148749202fa56ba257

    • SSDEEP

      768:B+m6ERp2NGFpuZYNLsWTjCKZKfgm3EhyM:BRpAGXLsWT+F7EgM

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks