General

  • Target

    Discord volume up 1.2.exe

  • Size

    46KB

  • Sample

    240423-srs3tshd64

  • MD5

    eda23608a57adef03353df52ef3f06c3

  • SHA1

    0115336c5079d972814f0dfe5fc2d9a8056fff73

  • SHA256

    721d579ac9306e8cfb33ed09349e8d509d9ed3ca2e7abe9bbe6d69f9b4a8006c

  • SHA512

    0f6a945c84b35c0a3aab203d046ee76150e204522d020a4f89a8266cbb3453842a787661dcbec16e164199a2c00529931a0d8786c35475aa4d15449be96a3d0d

  • SSDEEP

    768:ajLB+NAu98bTEehX0W9puZrLEPTjhNKZKfgm3EhOSLj:zAuubTEQz9ULEPT7F7EYy

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1232345926203609129/boj6_wrTqBY1eXKl-xhVfTv2GmMDL3mi4GSx8zi2Aw9sBBtbDDaBWq3UFN2rItebxxjd

Targets

    • Target

      Discord volume up 1.2.exe

    • Size

      46KB

    • MD5

      eda23608a57adef03353df52ef3f06c3

    • SHA1

      0115336c5079d972814f0dfe5fc2d9a8056fff73

    • SHA256

      721d579ac9306e8cfb33ed09349e8d509d9ed3ca2e7abe9bbe6d69f9b4a8006c

    • SHA512

      0f6a945c84b35c0a3aab203d046ee76150e204522d020a4f89a8266cbb3453842a787661dcbec16e164199a2c00529931a0d8786c35475aa4d15449be96a3d0d

    • SSDEEP

      768:ajLB+NAu98bTEehX0W9puZrLEPTjhNKZKfgm3EhOSLj:zAuubTEQz9ULEPT7F7EYy

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks