General
-
Target
sbHBAhjbsa.exe
-
Size
41KB
-
Sample
240730-1rzjls1cmp
-
MD5
afbb43b44b95fecee1d017414031254b
-
SHA1
d9546073e6a5da4b684ce8e86cef8bfb2354f18a
-
SHA256
d09bafb8d1a2c81142d5ebc9d259810e731a645774f6a0967dfcc18e32ca7dd6
-
SHA512
9e7453b66c83cafc9f0c0fc46cd17568a80e84793f7c6f28d21c8236ca16cd549ff8f1383e1b20dccbce26dd4f48a60ac3a43187f0c452412e1aee232a1bbdc2
-
SSDEEP
768:7scWsQj++y0WybOVioqwluZFenWTjMKZKfgm3EhRA:gcB+6GenWTwF7ErA
Behavioral task
behavioral1
Sample
sbHBAhjbsa.exe
Resource
win11-20240730-fr
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/1265115897622822922/sKHSkvAozNOKztWBy15s30wzxno1ChZP19kVme6i0-pZiewoQf_88CDgmR0iIigJbbL4
Extracted
redline
185.196.9.26:6302
Targets
-
-
Target
sbHBAhjbsa.exe
-
Size
41KB
-
MD5
afbb43b44b95fecee1d017414031254b
-
SHA1
d9546073e6a5da4b684ce8e86cef8bfb2354f18a
-
SHA256
d09bafb8d1a2c81142d5ebc9d259810e731a645774f6a0967dfcc18e32ca7dd6
-
SHA512
9e7453b66c83cafc9f0c0fc46cd17568a80e84793f7c6f28d21c8236ca16cd549ff8f1383e1b20dccbce26dd4f48a60ac3a43187f0c452412e1aee232a1bbdc2
-
SSDEEP
768:7scWsQj++y0WybOVioqwluZFenWTjMKZKfgm3EhRA:gcB+6GenWTwF7ErA
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2