Behavioral task
behavioral1
Sample
7a4dc2a8a41a6c39fd9acb97049139e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a4dc2a8a41a6c39fd9acb97049139e5.exe
Resource
win10v2004-20231222-en
General
-
Target
7a4dc2a8a41a6c39fd9acb97049139e5
-
Size
204KB
-
MD5
7a4dc2a8a41a6c39fd9acb97049139e5
-
SHA1
83d8d35d1f447578bafc36699244ea2c842bba14
-
SHA256
cb9bb79eff442ff90346150fcfcf1d76cb4dbac80e9e1464fd0775d525f3c47f
-
SHA512
76d979df1d58ca7a46e12b4b14a376ca65358220b0151aa99c0ff6a795735a5fae93206a2fef4194354447f51e096a9b2d8e01fe2162b4e70278a77bf2363d1c
-
SSDEEP
768:zWgpfEUK4Y8Y9UomM8uZ1L650TjtKZKfgm3EhO737jK0oabFV9R+XJHO:9fFLYSWL650TZF7EY73nK0xrPgpO
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/860980612672389151/-zN7TeL3WTYen3Mc_LGqTrFYBGmLfOUZ9xCPi2BsqsqiNg6-B_t-KwyXWDbRGN7D8hDK
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a4dc2a8a41a6c39fd9acb97049139e5
Files
-
7a4dc2a8a41a6c39fd9acb97049139e5.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ