General

  • Target

    6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118

  • Size

    42KB

  • Sample

    240725-kfh5gsyapp

  • MD5

    6ed782d7c506c1bc4b48f7777b2e61ed

  • SHA1

    39b8bc345a681d0dd50e7e73d88b2a08c7f55182

  • SHA256

    b0f180f9a10c0a67bbb9e93c49e7e5cee87a83c59e7926d7bd8b89801a2db8d7

  • SHA512

    1b74dbcd9a3ce900ee0a900333e852ea58a6a4e41325744362daa501f8c95abdbeabbc32fd00ffc9f29b3bd9d3699d69a67b6623fbe88fac5084681a90bb86e2

  • SSDEEP

    768:zRmLvZ8DylO8wuZHLNaTj9KZKfgm3EhyE:Uj6D98dLNaThF7EYE

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/894259685274841180/ngfBaQeVxACr5Og8svG2A6bUi3RntYVe5d7lRbZAiwXVUA-GlvW0v253fEq_kqWi4SRd

Targets

    • Target

      6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118

    • Size

      42KB

    • MD5

      6ed782d7c506c1bc4b48f7777b2e61ed

    • SHA1

      39b8bc345a681d0dd50e7e73d88b2a08c7f55182

    • SHA256

      b0f180f9a10c0a67bbb9e93c49e7e5cee87a83c59e7926d7bd8b89801a2db8d7

    • SHA512

      1b74dbcd9a3ce900ee0a900333e852ea58a6a4e41325744362daa501f8c95abdbeabbc32fd00ffc9f29b3bd9d3699d69a67b6623fbe88fac5084681a90bb86e2

    • SSDEEP

      768:zRmLvZ8DylO8wuZHLNaTj9KZKfgm3EhyE:Uj6D98dLNaThF7EYE

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks