General

  • Target

    dae265f15a2f0d9be42a935762334eeb

  • Size

    46KB

  • Sample

    240321-gwdm6aee4v

  • MD5

    dae265f15a2f0d9be42a935762334eeb

  • SHA1

    f627b044c8a5bfaf9fb3c37990d8d467f592a823

  • SHA256

    63b54beb6c75332e1aba006f25e0f09ca0c7cafcf88eea78369f0a1984d3825c

  • SHA512

    67595f0e01c2aa6d0a3d954bcfd392e5a5ed977e8a4e7823ce72b1051cc2414ce42490c7ffcf34c88ad61c8bb8498ffddf00fb2eb7aea43639af42180a305cc4

  • SSDEEP

    768:OMpdnWyobcMra82j/uZ6LyATj5KZKfgm3EhD9:Ov/oMrc1LyATFF7E59

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/870971151042621440/s1HnCY32ABGdBxs3bkuRHAInRsgvg9CvCKwlrwKH1-fnLPvP7t0lnaZDSFd5b_xsafpJ

Targets

    • Target

      dae265f15a2f0d9be42a935762334eeb

    • Size

      46KB

    • MD5

      dae265f15a2f0d9be42a935762334eeb

    • SHA1

      f627b044c8a5bfaf9fb3c37990d8d467f592a823

    • SHA256

      63b54beb6c75332e1aba006f25e0f09ca0c7cafcf88eea78369f0a1984d3825c

    • SHA512

      67595f0e01c2aa6d0a3d954bcfd392e5a5ed977e8a4e7823ce72b1051cc2414ce42490c7ffcf34c88ad61c8bb8498ffddf00fb2eb7aea43639af42180a305cc4

    • SSDEEP

      768:OMpdnWyobcMra82j/uZ6LyATj5KZKfgm3EhD9:Ov/oMrc1LyATFF7E59

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks