Behavioral task
behavioral1
Sample
8309a45965349aef4b15dc15468bcc5f08d9db07553270c4ab86fc3eb01575f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8309a45965349aef4b15dc15468bcc5f08d9db07553270c4ab86fc3eb01575f3.exe
Resource
win10v2004-20220812-en
General
-
Target
8309a45965349aef4b15dc15468bcc5f08d9db07553270c4ab86fc3eb01575f3
-
Size
41KB
-
MD5
329a34fe36ba2362a0a6dbb07f634fd0
-
SHA1
00851f7fc9b25dabe545dcffbda1cd37542a8595
-
SHA256
8309a45965349aef4b15dc15468bcc5f08d9db07553270c4ab86fc3eb01575f3
-
SHA512
6968622c06500914ed98283ea59315f3a4489a817290355ffa0639888363be8ed2ddbd284c5f52c340ecba353a51294174f5cad4aa8f918e97c7a5e68f8ccb66
-
SSDEEP
768:HscaIiIS+7YcnVSPYwIuZjeFWTjiKZKfgm3EhK1:Mc1lYcsPpeFWTWF7Eo1
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1023451833458491432/-U9kOI5BphlCyPkaTD29eGHqs8rq0VIklhqRMrHQPIl290NZUUBH1fty_x__djO4F9J2
Signatures
-
Mercurialgrabber family
Files
-
8309a45965349aef4b15dc15468bcc5f08d9db07553270c4ab86fc3eb01575f3.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ