General

  • Target

    ca9eedca0ce2b9118e861964ad09c7fb

  • Size

    403KB

  • Sample

    240315-gdtxesbd64

  • MD5

    ca9eedca0ce2b9118e861964ad09c7fb

  • SHA1

    94d87f27e9eefebd30ca0fcbe30298a5e4f874a9

  • SHA256

    65802e2eea53e4284b874067a33028fbbe988f17a98f00c06ffb1ff910590d87

  • SHA512

    a0825170260147d4fd056086aa54b221cd6d1d8e40e79ba301c2643939cfeedf7b9918d66f40afbca312497351803573c73814089a969348fa3bfbe83d3ec3b9

  • SSDEEP

    1536:rKT36LtOTxF7Evr/vH7mTRVBjv8YoyIYxgy:WT36LsTxF7Evr/v7URVBjv8YoyIY+

Malware Config

Extracted

Family

mercurialgrabber

C2

https://canary.discord.com/api/webhooks/883091306446995457/hMGyu072vJPsKn5pJs486DferP3KruPmuqDh5_sODfXnSscC_H04j1KiDmvR9zTIGdvX

Targets

    • Target

      ca9eedca0ce2b9118e861964ad09c7fb

    • Size

      403KB

    • MD5

      ca9eedca0ce2b9118e861964ad09c7fb

    • SHA1

      94d87f27e9eefebd30ca0fcbe30298a5e4f874a9

    • SHA256

      65802e2eea53e4284b874067a33028fbbe988f17a98f00c06ffb1ff910590d87

    • SHA512

      a0825170260147d4fd056086aa54b221cd6d1d8e40e79ba301c2643939cfeedf7b9918d66f40afbca312497351803573c73814089a969348fa3bfbe83d3ec3b9

    • SSDEEP

      1536:rKT36LtOTxF7Evr/vH7mTRVBjv8YoyIYxgy:WT36LsTxF7Evr/v7URVBjv8YoyIY+

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks