General

  • Target

    Ilike masturbation.exe

  • Size

    42KB

  • Sample

    220912-zmz4xaebe2

  • MD5

    29c148a621ddd5bd62ca83657d565b9a

  • SHA1

    3e4d3815c395a695362922584c251af34675c0eb

  • SHA256

    a72124792a80f2cffad7416c617babc1fb6d983dbe1f04581424b0419931ea26

  • SHA512

    930662abfac208ffeb21704a423b647831e5057947d01dc945605f27f2ca703831f276a7daf14d32401ab1d7b2768908c59b13f4f8ce6839d75f69e3723e2562

  • SSDEEP

    768:MrbeCSWyobcMra82jruZ6L9dTjcKZKfgm3EhdG:MriC/oMrcNL9dT4F7EnG

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1018579268629958677/X5dVcRrO5US2vOjjH3WVj26ytV2-7wgZcXomIxu8Dfux4G-zlYJ6U7nXBzEpJlL1E-vg

Targets

    • Target

      Ilike masturbation.exe

    • Size

      42KB

    • MD5

      29c148a621ddd5bd62ca83657d565b9a

    • SHA1

      3e4d3815c395a695362922584c251af34675c0eb

    • SHA256

      a72124792a80f2cffad7416c617babc1fb6d983dbe1f04581424b0419931ea26

    • SHA512

      930662abfac208ffeb21704a423b647831e5057947d01dc945605f27f2ca703831f276a7daf14d32401ab1d7b2768908c59b13f4f8ce6839d75f69e3723e2562

    • SSDEEP

      768:MrbeCSWyobcMra82jruZ6L9dTjcKZKfgm3EhdG:MriC/oMrcNL9dT4F7EnG

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks