Behavioral task
behavioral1
Sample
d2fc34c054ab90dac2ccd47e10185851f2c739b104daaded435ef006ef56944a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2fc34c054ab90dac2ccd47e10185851f2c739b104daaded435ef006ef56944a.exe
Resource
win10v2004-20220812-en
General
-
Target
d2fc34c054ab90dac2ccd47e10185851f2c739b104daaded435ef006ef56944a.exe
-
Size
306KB
-
MD5
86a19f291b19291a667abe0b267c0fe1
-
SHA1
9bb41a159f86e7eee7404493ff063cc4d2a85b2f
-
SHA256
d2fc34c054ab90dac2ccd47e10185851f2c739b104daaded435ef006ef56944a
-
SHA512
8bbe6cac04c831bdc108ab0499e931776f06490d7ad409c3af5926b1edbac7d4cce306517ee72987ac464dd8deefe1306a04754c937b1a80322ed223c38d7ccb
-
SSDEEP
3072:ITxlvLTTfF7ENvcdJIIJJJJJJKF/rS7jYdsfPw4LHOQV:Illv20AIJJJJJJKF/rS7jYdsfPw4LHB
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/877085586551361546/0c14CzLJknZ1DFLdJzFuPIYkAsHGk-WidrXB6ZNlG_QAyt-FfDyx_1STzCO1Dp-_DkH0
Signatures
-
Mercurialgrabber family
Files
-
d2fc34c054ab90dac2ccd47e10185851f2c739b104daaded435ef006ef56944a.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ