General
-
Target
dae265f15a2f0d9be42a935762334eeb
-
Size
46KB
-
Sample
240321-gwdm6aee4v
-
MD5
dae265f15a2f0d9be42a935762334eeb
-
SHA1
f627b044c8a5bfaf9fb3c37990d8d467f592a823
-
SHA256
63b54beb6c75332e1aba006f25e0f09ca0c7cafcf88eea78369f0a1984d3825c
-
SHA512
67595f0e01c2aa6d0a3d954bcfd392e5a5ed977e8a4e7823ce72b1051cc2414ce42490c7ffcf34c88ad61c8bb8498ffddf00fb2eb7aea43639af42180a305cc4
-
SSDEEP
768:OMpdnWyobcMra82j/uZ6LyATj5KZKfgm3EhD9:Ov/oMrc1LyATFF7E59
Behavioral task
behavioral1
Sample
dae265f15a2f0d9be42a935762334eeb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dae265f15a2f0d9be42a935762334eeb.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/870971151042621440/s1HnCY32ABGdBxs3bkuRHAInRsgvg9CvCKwlrwKH1-fnLPvP7t0lnaZDSFd5b_xsafpJ
Targets
-
-
Target
dae265f15a2f0d9be42a935762334eeb
-
Size
46KB
-
MD5
dae265f15a2f0d9be42a935762334eeb
-
SHA1
f627b044c8a5bfaf9fb3c37990d8d467f592a823
-
SHA256
63b54beb6c75332e1aba006f25e0f09ca0c7cafcf88eea78369f0a1984d3825c
-
SHA512
67595f0e01c2aa6d0a3d954bcfd392e5a5ed977e8a4e7823ce72b1051cc2414ce42490c7ffcf34c88ad61c8bb8498ffddf00fb2eb7aea43639af42180a305cc4
-
SSDEEP
768:OMpdnWyobcMra82j/uZ6LyATj5KZKfgm3EhD9:Ov/oMrc1LyATFF7E59
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-