General
-
Target
TPJRGIoL
-
Size
2KB
-
Sample
240802-phnj7s1ejh
-
MD5
5331c62030d48b58f3799aa9873c1b77
-
SHA1
e3bd12968bac5182b242af0531d776b314f6d7e3
-
SHA256
91893b32a2d41ade5c55b5f81199a927a312eeeaf6f3e6f21a4653aeb72842d5
-
SHA512
cb4c74edf1d3f1594129a6905e97d72a7f6e32fbe5553cad2fea7ffdebdafcde74c47ee9d9ad7563eea4c8c4bc99e52357000207127cac6321fa708042cacb1b
Static task
static1
Behavioral task
behavioral1
Sample
TPJRGIoL.html
Resource
win10-20240404-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1268904005900439704/aHcJRyaA1zmbznz3mFrqjZp_E0F9X_WvjA0KZFzhCghjBCchrAC64v7Qoe97xeUSXuao
https://discord.com/api/webhooks/1268907786306322535/8vxUjZTvXYwCEl6UAC5vC5hTn_9ziV3cLHZrWK2FoIzHaIBUDkq8IvytioecE79oyZff
Targets
-
-
Target
TPJRGIoL
-
Size
2KB
-
MD5
5331c62030d48b58f3799aa9873c1b77
-
SHA1
e3bd12968bac5182b242af0531d776b314f6d7e3
-
SHA256
91893b32a2d41ade5c55b5f81199a927a312eeeaf6f3e6f21a4653aeb72842d5
-
SHA512
cb4c74edf1d3f1594129a6905e97d72a7f6e32fbe5553cad2fea7ffdebdafcde74c47ee9d9ad7563eea4c8c4bc99e52357000207127cac6321fa708042cacb1b
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
2