General
-
Target
f0f18bc9fde3a2850814c5aa8720a60a_JaffaCakes118
-
Size
251KB
-
Sample
240415-njbrcsfe3y
-
MD5
f0f18bc9fde3a2850814c5aa8720a60a
-
SHA1
6b4d7b0a834acac19d3e000baef33c189d6de6e2
-
SHA256
cd054380dd8340a48b80bb707a53a526e74080ed7013731d2a695ae3216c654b
-
SHA512
30ba79ffaa6d274689b4583bf32e12f9b171f7e2089b8c0003719ae8528c82e0b4f70df6f4de279fb7104188db22acde247cdbd38b703b9b296742e7b9123d5a
-
SSDEEP
6144:NkrjBJ7NevL4zZDIKGV8z3kuVFML/c6P:NkRVNuktDRTI
Behavioral task
behavioral1
Sample
f0f18bc9fde3a2850814c5aa8720a60a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0f18bc9fde3a2850814c5aa8720a60a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/875481193993371748/t7IHV3pQMZ09Rf609CpkWo0Ily_70_5E-TqS9u3xSZQQIZ2gTRfd-tqcEG22P7BA_kbI
Targets
-
-
Target
f0f18bc9fde3a2850814c5aa8720a60a_JaffaCakes118
-
Size
251KB
-
MD5
f0f18bc9fde3a2850814c5aa8720a60a
-
SHA1
6b4d7b0a834acac19d3e000baef33c189d6de6e2
-
SHA256
cd054380dd8340a48b80bb707a53a526e74080ed7013731d2a695ae3216c654b
-
SHA512
30ba79ffaa6d274689b4583bf32e12f9b171f7e2089b8c0003719ae8528c82e0b4f70df6f4de279fb7104188db22acde247cdbd38b703b9b296742e7b9123d5a
-
SSDEEP
6144:NkrjBJ7NevL4zZDIKGV8z3kuVFML/c6P:NkRVNuktDRTI
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-