General

  • Target

    a06603e7b38c94a412964efcdf34b3d5bbbad837459137f656094441218fcbde

  • Size

    49KB

  • Sample

    220907-lmh9habfb3

  • MD5

    24b4d88706c406e590165b4610eb03ed

  • SHA1

    4fd9600a00d7e894474a8f8161717c8f1dd6e890

  • SHA256

    a06603e7b38c94a412964efcdf34b3d5bbbad837459137f656094441218fcbde

  • SHA512

    61158e62b24f5e439076f5a6919388a06b4fd6450f0802d61611ddebc11086e9b131115feaf688563ce9e25b9816e3727f9f76a9be1cc4e7f173b09363c8ba07

  • SSDEEP

    768:p4gWknHb7kMW0PMowfuZ5L3jcTjfKZKfgm3EhePHgtXx3/ThaaV:p4gaME1yL3jcTLF7EcPHgth3/3V

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/877528061078278187/nHQ5HimIuHl8y3vYo0-_FPULqqY3ROm2Urf3-blMoEAl_Hty9RJmxZyXEgkxeIu8aCL-

Targets

    • Target

      a06603e7b38c94a412964efcdf34b3d5bbbad837459137f656094441218fcbde

    • Size

      49KB

    • MD5

      24b4d88706c406e590165b4610eb03ed

    • SHA1

      4fd9600a00d7e894474a8f8161717c8f1dd6e890

    • SHA256

      a06603e7b38c94a412964efcdf34b3d5bbbad837459137f656094441218fcbde

    • SHA512

      61158e62b24f5e439076f5a6919388a06b4fd6450f0802d61611ddebc11086e9b131115feaf688563ce9e25b9816e3727f9f76a9be1cc4e7f173b09363c8ba07

    • SSDEEP

      768:p4gWknHb7kMW0PMowfuZ5L3jcTjfKZKfgm3EhePHgtXx3/ThaaV:p4gaME1yL3jcTLF7EcPHgth3/3V

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks