Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    1689dffc1e73cdeb1d9a4e671412816e.bin

  • Size

    18KB

  • Sample

    240709-bglgkayaqm

  • MD5

    ac1dd3e4aaac72b0262e0cb3e81fc130

  • SHA1

    e8948cbafd0dd1e22347227d34703886c08ab51b

  • SHA256

    36697dcacb24afaca501edc09d9ca2ce161abb9abf0b0c527b374125f2151580

  • SHA512

    6cc2a6ac518386cba02679ae0b15995ae9801cabf7fc3e22d3712baa13217558066ae7084ecc8cf69fa99cb0abc602fae335b6923ec56f21dd2f119d6c5c78cb

  • SSDEEP

    384:pCqZXqOwg0qoIbJtoASadLQRdDJgI8BilsZn4VJQ:pBdmqRoAzdaBJgzZ40

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/977976769548255272/WjivQonZRXcZP2_JHbnYGt-N9ZAhJY4ZvmzB8VRuMXHWezW7Oe1HFRaEtPt_IzCPISA6

Targets

    • Target

      17de798cb189cb705b5fb50f420827ba90f18e34831dd8b84be013d5d339b01a.exe

    • Size

      41KB

    • MD5

      1689dffc1e73cdeb1d9a4e671412816e

    • SHA1

      2b60c62d850db0c6f636eb40415883c9ce268fef

    • SHA256

      17de798cb189cb705b5fb50f420827ba90f18e34831dd8b84be013d5d339b01a

    • SHA512

      11877d9eeeea999092126d248da117a8709786d7ee17653363e25d65289379b7031e3656bf07734f515ca89e194f13c8dc1aa8dce8e83e5d4514a5e632ac056b

    • SSDEEP

      768:IscGoA2e8bH5M/Bgw9uZzeHWTjfJCKZKfgm3Eh2K:Pc9e86oeHWTdCF7EMK

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.