General
-
Target
celex.exe
-
Size
57KB
-
Sample
240601-1zdbcagb8x
-
MD5
69a50f0c4f89045e1eb9e40f9572eed3
-
SHA1
6f85531565de2110fffd32c41e2a4dfb302fb2cb
-
SHA256
627ad8116d070bd8a7f9ccd5b392404d330eb07dcc44a137a550b5addb43f3b1
-
SHA512
877a3f8a885c743de34b840d9c7e72a083db5d3a9f013898a1e889944d3fa2489ab98814d5582c6202d1a631ef3e6152fdf3ff15c94046366ffc3a9c928e70e3
-
SSDEEP
768:a/pdgOpRTs+ZeWuZwLpsTjSKZKfgm3EhG8Z2FzQa9T:GpRTNZxLpsTeF7Ew8sz/
Behavioral task
behavioral1
Sample
celex.exe
Resource
win11-20240508-en
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/1227755328331055104/yv0O4qpiLKYiPVsNq52ssWn10u8_DYKLpIwqabGIAH6LWtMNT1NnTVGkUAqT7knivE64
Targets
-
-
Target
celex.exe
-
Size
57KB
-
MD5
69a50f0c4f89045e1eb9e40f9572eed3
-
SHA1
6f85531565de2110fffd32c41e2a4dfb302fb2cb
-
SHA256
627ad8116d070bd8a7f9ccd5b392404d330eb07dcc44a137a550b5addb43f3b1
-
SHA512
877a3f8a885c743de34b840d9c7e72a083db5d3a9f013898a1e889944d3fa2489ab98814d5582c6202d1a631ef3e6152fdf3ff15c94046366ffc3a9c928e70e3
-
SSDEEP
768:a/pdgOpRTs+ZeWuZwLpsTjSKZKfgm3EhG8Z2FzQa9T:GpRTNZxLpsTeF7Ew8sz/
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-