General

  • Target

    324c353a7bcc9485ff293c1071dbcd79

  • Size

    41KB

  • Sample

    231225-wfe9dagdem

  • MD5

    324c353a7bcc9485ff293c1071dbcd79

  • SHA1

    d8077c388baa26a0dc3a65d862981ebe57a6f8bb

  • SHA256

    21d70be7274c9b1c33532f2b81f90b9e4781282d542b33d5fd1aea2f1fd64113

  • SHA512

    b29c8a367b16dca66c76bdd5268ca86abd0edd02137ae8ffb57a2571aab6daa3dd7c0b3a9aa8171c52058b8609664d70ccd7d669e6bf8667d52051343a6ea5eb

  • SSDEEP

    768:hscGoAj+7YZuSPYwHuZ4ewWTjJ+KZKfgm3EhG2:ecrYbPVewWTV+F7Eg2

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/869038691287449630/Z9MLK20zIBb7F6VA2aZ-kv_KVXFyqjXP03MF0qWYvOxh--yajlvrwwh4JGITWz09yryc

Targets

    • Target

      324c353a7bcc9485ff293c1071dbcd79

    • Size

      41KB

    • MD5

      324c353a7bcc9485ff293c1071dbcd79

    • SHA1

      d8077c388baa26a0dc3a65d862981ebe57a6f8bb

    • SHA256

      21d70be7274c9b1c33532f2b81f90b9e4781282d542b33d5fd1aea2f1fd64113

    • SHA512

      b29c8a367b16dca66c76bdd5268ca86abd0edd02137ae8ffb57a2571aab6daa3dd7c0b3a9aa8171c52058b8609664d70ccd7d669e6bf8667d52051343a6ea5eb

    • SSDEEP

      768:hscGoAj+7YZuSPYwHuZ4ewWTjJ+KZKfgm3EhG2:ecrYbPVewWTV+F7Eg2

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks