General

  • Target

    connection.exe

  • Size

    41KB

  • MD5

    028bf43765fd5740df6ee1cbc5f7d32a

  • SHA1

    234d038291208ef32ec35cb97433e2aefcab55f5

  • SHA256

    169ed579b6d3311d8b09f750359b07bad69520ad72abd8a6a6f67069d3c6d937

  • SHA512

    b7c0bfea011766597b99e59304de91099f5c8e91adbb46a3cf6a1cfddd6f14725e964b474c89dda18f7f6c3c44914533749f0ae8824be0e593883ca52ca1a98e

  • SSDEEP

    768:oscaIiIJVEaxAiI/ywmuZDeFWTjSKZKfgm3EhAG:vc1jVE/9eFWTGF7EWG

Score
10/10

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1163860957546676244/Tr0vbiHfaBLONi1q8rhwgNDPXrsDZTRmEMTJEkXwdGd3Rj27hN8kShu7EFuvkxKMo7Mb

Signatures

  • Mercurialgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • connection.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections