General

  • Target

    486e5455e5a7b1edf125a86c37ca3a5a

  • Size

    108KB

  • Sample

    240107-jrfytshacl

  • MD5

    486e5455e5a7b1edf125a86c37ca3a5a

  • SHA1

    a93e3f16749dafa3ca288fdd1b06af8c49daa117

  • SHA256

    2cd3569be624b29aceeaaf3a5c445e92b654ed1340563c8afcd624bb1ff1e3eb

  • SHA512

    359bfd77102291435f66f3557c57669c7296ee2936376083ff62c1a1c5b039b1055d5c37779479cd42d3787b928655d2fd97aa1aaba77f93cbafdb1cc7726d95

  • SSDEEP

    768:BAAppAUvRHCkuZ1LSLTjbKZKfgm3Ehu2nfffffffffffffffBffffffffffffff0:PRHCXLSLTfF7EU2r

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/879035996652601384/zoXJKqNdFb7ygqdlaZv6Ef0utel9dojoeMTW78ABZAM0SPuvSKZn_VuXTLH5p8xg8IUQ

Targets

    • Target

      486e5455e5a7b1edf125a86c37ca3a5a

    • Size

      108KB

    • MD5

      486e5455e5a7b1edf125a86c37ca3a5a

    • SHA1

      a93e3f16749dafa3ca288fdd1b06af8c49daa117

    • SHA256

      2cd3569be624b29aceeaaf3a5c445e92b654ed1340563c8afcd624bb1ff1e3eb

    • SHA512

      359bfd77102291435f66f3557c57669c7296ee2936376083ff62c1a1c5b039b1055d5c37779479cd42d3787b928655d2fd97aa1aaba77f93cbafdb1cc7726d95

    • SSDEEP

      768:BAAppAUvRHCkuZ1LSLTjbKZKfgm3Ehu2nfffffffffffffffBffffffffffffff0:PRHCXLSLTfF7EU2r

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks