Behavioral task
behavioral1
Sample
9f08110869579ebf74396c174b2da01d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9f08110869579ebf74396c174b2da01d.exe
Resource
win10v2004-20231215-en
General
-
Target
9f08110869579ebf74396c174b2da01d
-
Size
42KB
-
MD5
9f08110869579ebf74396c174b2da01d
-
SHA1
daa713676652b5fb2f5c3b42983b9140c102f91f
-
SHA256
82282111d091f5e590a93d58df04fdca473877ab9b17ac8cbda1de1da23f9f2c
-
SHA512
7cb7391ab5ce84d8db1ba2c0216f70b9415e47f39abed9ba1a34daacd837559beda7b4bf032477d808e4e04a30f832101c3164bffda16c5ee322cf8eb71174f3
-
SSDEEP
384:PUPnsRk5X2rh3APlKOCh/XTNTW0s/XZxIh/XoJEFq5nmoqTAs4KQsLd/SfgUfAGH:PjAWh/jNJuZpLJqTj4KZKfgm3Eh6So
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/869112850830983269/6FXnaXZDgBG89Vk260RUMRdMPPOUG3htIyG_t8gpZ3RgtzEY9xSUVCMtQFK6Lc7tS8OC
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9f08110869579ebf74396c174b2da01d
Files
-
9f08110869579ebf74396c174b2da01d.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ