General

  • Target

    TPJRGIoL

  • Size

    2KB

  • Sample

    240802-phnj7s1ejh

  • MD5

    5331c62030d48b58f3799aa9873c1b77

  • SHA1

    e3bd12968bac5182b242af0531d776b314f6d7e3

  • SHA256

    91893b32a2d41ade5c55b5f81199a927a312eeeaf6f3e6f21a4653aeb72842d5

  • SHA512

    cb4c74edf1d3f1594129a6905e97d72a7f6e32fbe5553cad2fea7ffdebdafcde74c47ee9d9ad7563eea4c8c4bc99e52357000207127cac6321fa708042cacb1b

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1268904005900439704/aHcJRyaA1zmbznz3mFrqjZp_E0F9X_WvjA0KZFzhCghjBCchrAC64v7Qoe97xeUSXuao

https://discord.com/api/webhooks/1268907786306322535/8vxUjZTvXYwCEl6UAC5vC5hTn_9ziV3cLHZrWK2FoIzHaIBUDkq8IvytioecE79oyZff

Targets

    • Target

      TPJRGIoL

    • Size

      2KB

    • MD5

      5331c62030d48b58f3799aa9873c1b77

    • SHA1

      e3bd12968bac5182b242af0531d776b314f6d7e3

    • SHA256

      91893b32a2d41ade5c55b5f81199a927a312eeeaf6f3e6f21a4653aeb72842d5

    • SHA512

      cb4c74edf1d3f1594129a6905e97d72a7f6e32fbe5553cad2fea7ffdebdafcde74c47ee9d9ad7563eea4c8c4bc99e52357000207127cac6321fa708042cacb1b

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks