General
-
Target
b778b678dec7628be67e90c0890bbe38
-
Size
43KB
-
Sample
240306-qcdcqabd9w
-
MD5
b778b678dec7628be67e90c0890bbe38
-
SHA1
e63b4fff8e5f22414818772b3c26cea7c11add5c
-
SHA256
55f63151703cb82c89173f1ae1bb3ea900d0e75d794a125148c3bfdcf51ba76c
-
SHA512
fec7f3770707e392dd62500017ee5ce138031ab97c3b615d1ed5628f3f4f88344860983fcb559bbc13446c97d93351a45267324158445b52f076f142e1f43224
-
SSDEEP
768:n8QvO4dxCGIQ7YBRuZiLmacTjLKZKfgm3Ehv53i:8PUx0BtLpcTvF7ER5S
Behavioral task
behavioral1
Sample
b778b678dec7628be67e90c0890bbe38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b778b678dec7628be67e90c0890bbe38.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/881025250232504350/M9vbl5rP0xQoomDziaV19_6D72F_KVHw3UK5q75Vr2b3kVrNJgwLZedo2yylvpQFo9zX
Targets
-
-
Target
b778b678dec7628be67e90c0890bbe38
-
Size
43KB
-
MD5
b778b678dec7628be67e90c0890bbe38
-
SHA1
e63b4fff8e5f22414818772b3c26cea7c11add5c
-
SHA256
55f63151703cb82c89173f1ae1bb3ea900d0e75d794a125148c3bfdcf51ba76c
-
SHA512
fec7f3770707e392dd62500017ee5ce138031ab97c3b615d1ed5628f3f4f88344860983fcb559bbc13446c97d93351a45267324158445b52f076f142e1f43224
-
SSDEEP
768:n8QvO4dxCGIQ7YBRuZiLmacTjLKZKfgm3Ehv53i:8PUx0BtLpcTvF7ER5S
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-