Behavioral task
behavioral1
Sample
drexgrabber.exe
Resource
win10-20230703-en
General
-
Target
drexgrabber.exe
-
Size
41KB
-
MD5
03c35bba6b01980923da47f1667603b2
-
SHA1
96c14621d1d4580b8dc1ba7174ef168591aba8cc
-
SHA256
ba9b66e4af028959aaac31aa6d74a09e9e4cd8bc31fce00250328e4ab8053f86
-
SHA512
40b322aab326fa3c15433701dd912b5a4b688145422e7b1c2419e4589360adb4a36411f69322017c4a86bcf44bcb02993a7df3ecf35211ed9d635187397d6738
-
SSDEEP
768:5scaIyIqEemmpKYgGz3wVuZ/e6WTjeKZKfgm3EhhA:mc1eBZve6WTKF7E7A
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1140322513755308185/Zru5R3Imi_p01TgXsYXxo8TZXbXieCp0T3GFCAc9QSwVsz6QVcpQ1RBn2uKCL3z4leIA
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource drexgrabber.exe
Files
-
drexgrabber.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ