General

  • Target

    d32655829ffa6cc3c964d9556a769f03

  • Size

    41KB

  • Sample

    240318-lcdw2aea4z

  • MD5

    d32655829ffa6cc3c964d9556a769f03

  • SHA1

    a41fec24b34a0099f18bc22c314ff060e8419774

  • SHA256

    2a11551d41a6b437175ff5d89627aeb4b4ba87f5684e71b679ad1d0b37656521

  • SHA512

    fe85358358e0403b86cfb1d71a3e3976b072db1c4f9a7d2b9a3118967fc41e4e799463d6b21afb72168676890ee5b66d60f9290a9c9641e48eb2e3a6dded5e90

  • SSDEEP

    768:KscpawEYGAbi/ehXmRGwCsuZuebWTjbKZKfgm3EhWq:JcEYGAbeQmRksebWT3F7EYq

Malware Config

Extracted

Family

mercurialgrabber

C2

https://canary.discord.com/api/webhooks/870839174398365737/VMVw2G6QGoCnG88Vj3oyZ48a5oZ2bTUy5R-uf_QH5CC7cqQn9B38YpudbC6Ev447cv7u

Targets

    • Target

      d32655829ffa6cc3c964d9556a769f03

    • Size

      41KB

    • MD5

      d32655829ffa6cc3c964d9556a769f03

    • SHA1

      a41fec24b34a0099f18bc22c314ff060e8419774

    • SHA256

      2a11551d41a6b437175ff5d89627aeb4b4ba87f5684e71b679ad1d0b37656521

    • SHA512

      fe85358358e0403b86cfb1d71a3e3976b072db1c4f9a7d2b9a3118967fc41e4e799463d6b21afb72168676890ee5b66d60f9290a9c9641e48eb2e3a6dded5e90

    • SSDEEP

      768:KscpawEYGAbi/ehXmRGwCsuZuebWTjbKZKfgm3EhWq:JcEYGAbeQmRksebWT3F7EYq

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks