General
-
Target
ffc685ef7323e67570df6740a308a365_JaffaCakes118
-
Size
42KB
-
Sample
240421-vt4cpafh29
-
MD5
ffc685ef7323e67570df6740a308a365
-
SHA1
8e8c5cd7c0e4662107efba411b7714d2cc1a287e
-
SHA256
5ec07c62956dc1e5a84851448d7520c79cbf48c140b0d44e00bf2cd816eb687f
-
SHA512
0c7ee01cd7695bf8efc48d58464a433ba92c728ee1aac4679c637917548dbc03d806845cb6c5541c633b57d699a98e54f56b4cd7ba85db54ae61c54085ddd20a
-
SSDEEP
768:SRmLvM7bTTylO0OuZ9LJkTjJKZKfgm3EhOSv:fjUbTT90tLJkTVF7EI+
Behavioral task
behavioral1
Sample
ffc685ef7323e67570df6740a308a365_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ffc685ef7323e67570df6740a308a365_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/883736221380145164/ELQVmid7iKH2kxHpnwEDEFpVGkgKYAKObJa5kcn7pPBI65J8LC_cVayfL5XF36C56auJ
Targets
-
-
Target
ffc685ef7323e67570df6740a308a365_JaffaCakes118
-
Size
42KB
-
MD5
ffc685ef7323e67570df6740a308a365
-
SHA1
8e8c5cd7c0e4662107efba411b7714d2cc1a287e
-
SHA256
5ec07c62956dc1e5a84851448d7520c79cbf48c140b0d44e00bf2cd816eb687f
-
SHA512
0c7ee01cd7695bf8efc48d58464a433ba92c728ee1aac4679c637917548dbc03d806845cb6c5541c633b57d699a98e54f56b4cd7ba85db54ae61c54085ddd20a
-
SSDEEP
768:SRmLvM7bTTylO0OuZ9LJkTjJKZKfgm3EhOSv:fjUbTT90tLJkTVF7EI+
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-