General

  • Target

    f4edcee0fccea560a55fd5a0af220a12_JaffaCakes118

  • Size

    433KB

  • Sample

    240417-dxhrqacd38

  • MD5

    f4edcee0fccea560a55fd5a0af220a12

  • SHA1

    263b1b7293692ff6cdf69b50b3250226940a2130

  • SHA256

    b87fbc334f9b723fe13dca8df569d4d69cee53228c94d98c05c5dda213126a92

  • SHA512

    aa2e224eb9951e748f8c54dd5a7f1175c9ee55e43cb85a9ea22c0ada89cb2bb07a428a8ad2118a10e5dcbcea88a7ed54df254d40cad4c9f6f40977efc5c2e28c

  • SSDEEP

    12288:aRZ+IoG/n9IQxW3OBsFGBHbpbmhshwKcrV:U2G/nvxW3Wl71mhLV

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/868606688339558410/hidbzrVtZvqqfQVZoZpaSpgBQWT8GpwqLDeONZx5uuJgGuKvizm4h547bL-l3GvbBDmQ

Targets

    • Target

      f4edcee0fccea560a55fd5a0af220a12_JaffaCakes118

    • Size

      433KB

    • MD5

      f4edcee0fccea560a55fd5a0af220a12

    • SHA1

      263b1b7293692ff6cdf69b50b3250226940a2130

    • SHA256

      b87fbc334f9b723fe13dca8df569d4d69cee53228c94d98c05c5dda213126a92

    • SHA512

      aa2e224eb9951e748f8c54dd5a7f1175c9ee55e43cb85a9ea22c0ada89cb2bb07a428a8ad2118a10e5dcbcea88a7ed54df254d40cad4c9f6f40977efc5c2e28c

    • SSDEEP

      12288:aRZ+IoG/n9IQxW3OBsFGBHbpbmhshwKcrV:U2G/nvxW3Wl71mhLV

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks