General
-
Target
41b97af3b62be4323ff65c0c7f16e00c.exe
-
Size
189KB
-
Sample
240104-yxqgsabaa3
-
MD5
41b97af3b62be4323ff65c0c7f16e00c
-
SHA1
d86f5294e70d84c7568c7c915a475baf9f6066fd
-
SHA256
188b92986af1e9cf65af8616b7e7deda342fbfa2afaf39dacdbc899ab41e37d9
-
SHA512
7b81419e5e01bd48e0466215d116aab16651562294428a5ed60ec49cb268d2f2b1287123f8820361724e2f132dee17eb656ce3ccdea1be7809c00c401bcd4cf7
-
SSDEEP
3072:iIwFLWT5F7EAEcq/O50AHLATeitOzVQzpcZEQMcemwf2Z+sP:twFQEK0ILkZOzVeWOQNeNf2EsP
Behavioral task
behavioral1
Sample
41b97af3b62be4323ff65c0c7f16e00c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41b97af3b62be4323ff65c0c7f16e00c.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
mercurialgrabber
https://canary.discord.com/api/webhooks/869511627765071883/Xrk52w7Jt0G4HLCLj8b9HdawlchIu9Cg-xWKxGPlEQpbCEu-zNMFz2_Zi58TqHF29Vqb
Targets
-
-
Target
41b97af3b62be4323ff65c0c7f16e00c.exe
-
Size
189KB
-
MD5
41b97af3b62be4323ff65c0c7f16e00c
-
SHA1
d86f5294e70d84c7568c7c915a475baf9f6066fd
-
SHA256
188b92986af1e9cf65af8616b7e7deda342fbfa2afaf39dacdbc899ab41e37d9
-
SHA512
7b81419e5e01bd48e0466215d116aab16651562294428a5ed60ec49cb268d2f2b1287123f8820361724e2f132dee17eb656ce3ccdea1be7809c00c401bcd4cf7
-
SSDEEP
3072:iIwFLWT5F7EAEcq/O50AHLATeitOzVQzpcZEQMcemwf2Z+sP:twFQEK0ILkZOzVeWOQNeNf2EsP
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-