General
-
Target
d2ac81fb6c423edd87d0463ba1f6fa11
-
Size
306KB
-
Sample
240318-fxpw5shb75
-
MD5
d2ac81fb6c423edd87d0463ba1f6fa11
-
SHA1
779293cefeeeafb20c0722f573436dffd651acb4
-
SHA256
1024f9838ac2775760fd9f7edb2f214671f3f9adbd499fe46a0965f1bb73242c
-
SHA512
763d41de0c52e28892ce53e4fa1a642f45d58fc9e24f550b22553458a8baae7fb4740995542eea82a0c9038acdc198bbdf2910ec9ddf3f674ca30406ebfcb8f4
-
SSDEEP
3072:vly9ELh5TIF7E9lpCAmAcOqOFRK9YUBgO9LJHc6XPCh6ZqI+2c1heCznLwj4F5wr:vly9EnDUAcr
Behavioral task
behavioral1
Sample
d2ac81fb6c423edd87d0463ba1f6fa11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2ac81fb6c423edd87d0463ba1f6fa11.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/883677795547508776/dIj1WychZlDxuZyH5SkB1ucht8JsqR9fZ9WHi0ihylMwDcoTy_J68FB9PQPITFlziX62
Targets
-
-
Target
d2ac81fb6c423edd87d0463ba1f6fa11
-
Size
306KB
-
MD5
d2ac81fb6c423edd87d0463ba1f6fa11
-
SHA1
779293cefeeeafb20c0722f573436dffd651acb4
-
SHA256
1024f9838ac2775760fd9f7edb2f214671f3f9adbd499fe46a0965f1bb73242c
-
SHA512
763d41de0c52e28892ce53e4fa1a642f45d58fc9e24f550b22553458a8baae7fb4740995542eea82a0c9038acdc198bbdf2910ec9ddf3f674ca30406ebfcb8f4
-
SSDEEP
3072:vly9ELh5TIF7E9lpCAmAcOqOFRK9YUBgO9LJHc6XPCh6ZqI+2c1heCznLwj4F5wr:vly9EnDUAcr
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-