Behavioral task
behavioral1
Sample
65d79862897aa6653668df7643717ccb73ddda1f2677a3fcf38b7bcb25a60749.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
65d79862897aa6653668df7643717ccb73ddda1f2677a3fcf38b7bcb25a60749.exe
Resource
win10v2004-20220812-en
General
-
Target
65d79862897aa6653668df7643717ccb73ddda1f2677a3fcf38b7bcb25a60749
-
Size
42KB
-
MD5
f9ca2b52d9ebce902d72c7c78c2a1e82
-
SHA1
4fc6005acb6b1dc72900aac1932d60935be15946
-
SHA256
65d79862897aa6653668df7643717ccb73ddda1f2677a3fcf38b7bcb25a60749
-
SHA512
ff8a144facd24038b69e762fb0b0453057a0e43fb7bdc074c66cacd41e24c6ce1177ba9eafc3934abe83cc53c9201fcc6f81d69d552fae15e78dd3bf70eee5e0
-
SSDEEP
768:oqQ1coge5b0duZwL71TjlcKZKfgm3EhSM:tSWlL71TSF7EIM
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/910977383102836756/gBUXTuE5IVFJiLF2Jt8l5DBa4WEv7Labk0HqghKUinIx_4qOAuAU_x1csAovNvb2vEcp
Signatures
-
Mercurialgrabber family
Files
-
65d79862897aa6653668df7643717ccb73ddda1f2677a3fcf38b7bcb25a60749.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ