General

  • Target

    c134be9183f8e1baf1c1475a468a98ed

  • Size

    294KB

  • Sample

    240311-v9theshf9w

  • MD5

    c134be9183f8e1baf1c1475a468a98ed

  • SHA1

    97530ff9247e065d4024a9719910cdca09a9e668

  • SHA256

    1e59dec24c499df08125a120a38207eadd88091384da292014da7fc753db93ac

  • SHA512

    7153f53f3c66960fd02ff9b103e44304ee4fc58e3902d16b0e6b9e37d03551941109246c0000afefdc79d31bb8d4670893cbd617f4de1d6cab17d82c0ad3c19b

  • SSDEEP

    6144:w8yuIfEW3gWVup6aaIb7b7YEKtayr4dZ1YnvkMK83LhJokenV6Iq2K7zJ+wpzx/4:vyuIfEW3gWVup6aaIb7b7YEKtayr4dZf

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/866572125506764821/L7CauC6B0qF1WUnQuEmSpJPjjXvj8gtD1PO7RXnvQmOuIX-EIsg2GFmoWzUoTy32cs4B

Targets

    • Target

      c134be9183f8e1baf1c1475a468a98ed

    • Size

      294KB

    • MD5

      c134be9183f8e1baf1c1475a468a98ed

    • SHA1

      97530ff9247e065d4024a9719910cdca09a9e668

    • SHA256

      1e59dec24c499df08125a120a38207eadd88091384da292014da7fc753db93ac

    • SHA512

      7153f53f3c66960fd02ff9b103e44304ee4fc58e3902d16b0e6b9e37d03551941109246c0000afefdc79d31bb8d4670893cbd617f4de1d6cab17d82c0ad3c19b

    • SSDEEP

      6144:w8yuIfEW3gWVup6aaIb7b7YEKtayr4dZ1YnvkMK83LhJokenV6Iq2K7zJ+wpzx/4:vyuIfEW3gWVup6aaIb7b7YEKtayr4dZf

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks