General
-
Target
RGF-main.zip
-
Size
54KB
-
Sample
240512-we2qzsbh82
-
MD5
7bcc565dfb0ce789f9a984870a64414c
-
SHA1
7918e05800b7d02be5aa3670259709fde7f5c268
-
SHA256
33461d788a33b88bed3d489826f9fb766cae421f322b81c5eb861718a1dea7bb
-
SHA512
0490c139cd781e827fa35e55d21d887990febb2ab158baac005755ae1825904cf8f2971a10e75e135fa350c40ac841815ddeb2fd5c9da2d7b350e9c509f027b0
-
SSDEEP
768:C2wkbG+ulfxDBcy7hCPWLp7BKgRfIa700K/2x6qKDcqVQ1WEx7HyWKpIpTtKP1ZC:CN1LPBcmKWLp7BTei/qVgRHfKJLYd9vr
Behavioral task
behavioral1
Sample
RGF-main.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
RGF-main/RBF.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/975244014364270683/FZnH_sfT1E7Axl_7pfCffp86xK6BWVM_UXXb74CN2p4kpHxH_6kuQsuzlglxNPVfnIm6
Targets
-
-
Target
RGF-main.zip
-
Size
54KB
-
MD5
7bcc565dfb0ce789f9a984870a64414c
-
SHA1
7918e05800b7d02be5aa3670259709fde7f5c268
-
SHA256
33461d788a33b88bed3d489826f9fb766cae421f322b81c5eb861718a1dea7bb
-
SHA512
0490c139cd781e827fa35e55d21d887990febb2ab158baac005755ae1825904cf8f2971a10e75e135fa350c40ac841815ddeb2fd5c9da2d7b350e9c509f027b0
-
SSDEEP
768:C2wkbG+ulfxDBcy7hCPWLp7BKgRfIa700K/2x6qKDcqVQ1WEx7HyWKpIpTtKP1ZC:CN1LPBcmKWLp7BTei/qVgRHfKJLYd9vr
Score1/10 -
-
-
Target
RGF-main/RBF.exe
-
Size
41KB
-
MD5
09d12c328c88bfdfef9dcc0927dca671
-
SHA1
4f61a36bc05dbd9229b56db5ead4ea3d37e4308a
-
SHA256
64e772d1da472d9da1dde4d9b070c1d9acf98d9819ec04058a0161f020022e49
-
SHA512
4774119f1eb6f3f712fc29f7c7cceb31a67c62c01a6b7f09ccf17a85a4d78b3fed4f3a9532c353490f9058aae5db58d305a92a65a8e8039e7c123f48e73d1d51
-
SSDEEP
768:escGoAxWdPN+wauZLePWTjZKZKfgm3Ehpe:tcVdPN9ePWTVF7Ebe
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-