Behavioral task
behavioral1
Sample
trackware leaked +++.exe
Resource
win10v2004-20230703-en
General
-
Target
trackware leaked +++.exe
-
Size
46KB
-
MD5
95bc936675673e99ce66592a5f172096
-
SHA1
67bbcf11ea8bbf0763668d316b89243b0e9beb52
-
SHA256
79de9f5d80b52488f8427eaa1a9b7972d658feeeca739831e196c3ded68650b5
-
SHA512
6f36167e33cf6f38331a50c019edf3608107f6231415f4578c3e152ae4a092155567121580b0c717c5e36a0f0a2cc045620ac747a805ccff9011b960f661bf3d
-
SSDEEP
768:BjLBbKKqqI2SrZDhuZiLHDTj9KZKfgm3EhAS7mca:HNqH2ofLHDT5F7EaXz
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1135556677366726792/KD7Ycd_y48McCdSP6hRTNv7oki6HzrPMjDpnfHaEmRKHmqHyI3M9f323bNCSBItoYij3
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource trackware leaked +++.exe
Files
-
trackware leaked +++.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ