General
-
Target
ca9eedca0ce2b9118e861964ad09c7fb
-
Size
403KB
-
Sample
240315-gdtxesbd64
-
MD5
ca9eedca0ce2b9118e861964ad09c7fb
-
SHA1
94d87f27e9eefebd30ca0fcbe30298a5e4f874a9
-
SHA256
65802e2eea53e4284b874067a33028fbbe988f17a98f00c06ffb1ff910590d87
-
SHA512
a0825170260147d4fd056086aa54b221cd6d1d8e40e79ba301c2643939cfeedf7b9918d66f40afbca312497351803573c73814089a969348fa3bfbe83d3ec3b9
-
SSDEEP
1536:rKT36LtOTxF7Evr/vH7mTRVBjv8YoyIYxgy:WT36LsTxF7Evr/v7URVBjv8YoyIY+
Behavioral task
behavioral1
Sample
ca9eedca0ce2b9118e861964ad09c7fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca9eedca0ce2b9118e861964ad09c7fb.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
mercurialgrabber
https://canary.discord.com/api/webhooks/883091306446995457/hMGyu072vJPsKn5pJs486DferP3KruPmuqDh5_sODfXnSscC_H04j1KiDmvR9zTIGdvX
Targets
-
-
Target
ca9eedca0ce2b9118e861964ad09c7fb
-
Size
403KB
-
MD5
ca9eedca0ce2b9118e861964ad09c7fb
-
SHA1
94d87f27e9eefebd30ca0fcbe30298a5e4f874a9
-
SHA256
65802e2eea53e4284b874067a33028fbbe988f17a98f00c06ffb1ff910590d87
-
SHA512
a0825170260147d4fd056086aa54b221cd6d1d8e40e79ba301c2643939cfeedf7b9918d66f40afbca312497351803573c73814089a969348fa3bfbe83d3ec3b9
-
SSDEEP
1536:rKT36LtOTxF7Evr/vH7mTRVBjv8YoyIYxgy:WT36LsTxF7Evr/v7URVBjv8YoyIY+
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-