Analysis
-
max time kernel
66s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:58
Behavioral task
behavioral1
Sample
output.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
output.exe
Resource
win10v2004-20240419-en
General
-
Target
output.exe
-
Size
42KB
-
MD5
2b844e8e60c62764e5b262595327e73e
-
SHA1
48d2adb709fd2449d5787d4d002e506bdc858fac
-
SHA256
7e68f6b1aac3c973b9a226e2c44d9cb84283512c4dcb1f612deee7e69723ad95
-
SHA512
f861d47b042bdaf9a0f2258ca477d0fd969fb260345e49ec7aedff2d9d802ec5cf21cdfafbc5951d12de4508dc4b0112f16a2691d6886ea71c281bd35b89c290
-
SSDEEP
768:gLIBZ6a14pDtsOuZ2LecTjUKZKfgm3EhJB:H1+PsGLecTgF7ETB
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1232394495962775595/Rp8wIvsvQzT0NY5mCKbpBT_ZIY4JozltmMHzcGWbJafnSsQJ1VJ_PNkBBdUVK8UthuDr
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 12 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip4.seeip.org 7 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 output.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString output.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 output.exe