General

  • Target

    working key.zip

  • Size

    18KB

  • MD5

    db27edd4a5250217b6ced48c54f73a14

  • SHA1

    d37756079e7748098896f398d8f9266c5ffebeff

  • SHA256

    434bee4e012adaf0088de6dbbd407b36e2dcdd5d6487d1b529492c8ffa2f82bc

  • SHA512

    be724fc408d7c86ab96b8659ebab7d81fd45c18f811bc692aa02f813ef8a11e8609eb4198ecf8bb9da4a7f3acec99c3f6db351393d688a352f2db2ee9fd7cecb

  • SSDEEP

    384:i+gLeUvwpwWFuG7kYLYBRMf6GAJKQ8NfL+nMf8tCi5FE8gm:JUQtuG7kYcsUMQC6Q8t9p

Score
10/10

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1223007453780775012/RmQhlmaS6I4pA1jXRQPJVPP5zpVjnzimQ1bM_90lRDIoExo4TSHsD7rxDV2WS0GJ9Ema

Signatures

  • Mercurialgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • working key.zip
    .zip
  • working key/working key/working key.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections