General
-
Target
d69b59702a81b47ec18daef03edbf4b2
-
Size
41KB
-
Sample
231220-ssvcaaefcr
-
MD5
d69b59702a81b47ec18daef03edbf4b2
-
SHA1
e49628015124c1d8e8550131e738e0367060cba7
-
SHA256
8bd44415728c6702c9d736a3c15fa089a6093574e1750443df16d6f0b9ed6f80
-
SHA512
62e400f6808d77ee312de39edbb9e517d5491a198ec52ab65f7a6b07b13ab96fd62d0d5dcbaf584da3f5a5d2abd6d41586f60ebb3d676ec0d872e8a8cc445bb0
-
SSDEEP
768:Vo15ehBZ6an8z5pDtsmuZ2L2xTjxKZKfgm3EhCp:D1n8z5PsOL2xTlF7EQp
Behavioral task
behavioral1
Sample
d69b59702a81b47ec18daef03edbf4b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d69b59702a81b47ec18daef03edbf4b2.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
d69b59702a81b47ec18daef03edbf4b2
-
Size
41KB
-
MD5
d69b59702a81b47ec18daef03edbf4b2
-
SHA1
e49628015124c1d8e8550131e738e0367060cba7
-
SHA256
8bd44415728c6702c9d736a3c15fa089a6093574e1750443df16d6f0b9ed6f80
-
SHA512
62e400f6808d77ee312de39edbb9e517d5491a198ec52ab65f7a6b07b13ab96fd62d0d5dcbaf584da3f5a5d2abd6d41586f60ebb3d676ec0d872e8a8cc445bb0
-
SSDEEP
768:Vo15ehBZ6an8z5pDtsmuZ2L2xTjxKZKfgm3EhCp:D1n8z5PsOL2xTlF7EQp
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-