General
-
Target
Z_lookup_phone_number_5685021465.apk
-
Size
22.5MB
-
Sample
240807-remjvasgpd
-
MD5
18f6a38db19b858d1a044cf08e62216d
-
SHA1
c09208f06c8d484072b1e1b4601f85608019b3fe
-
SHA256
701f93961976def77d541a81eed72fd053b862477c64dde1c09a43d85733d85c
-
SHA512
77953f45971ce41e3fd389882e14c59250723c0ab7e5eadbf104d42870e11023400177a281878e20e4ec5a2a30b15b71972f5ff8339ace4efbdde9a3af2e4006
-
SSDEEP
196608:GPIKImxXLJfgG00Lv/t2CrsclY1Sn1GXrAoXZIL6AzsrolgJqp8B1sPU:FKrAG00Ln1dmYWizYroYqp8B1sc
Static task
static1
Behavioral task
behavioral1
Sample
Z_lookup_phone_number_5685021465.apk
Resource
win10-20240404-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1268907786306322535/8vxUjZTvXYwCEl6UAC5vC5hTn_9ziV3cLHZrWK2FoIzHaIBUDkq8IvytioecE79oyZff
https://discord.com/api/webhooks/1270062393690689627/niIrEsktA3H6aMswKaDjRYhFO5PRSTQxgOiR-qbgiAtQ1pmjckiMwflpFojTjMaPduhi
Targets
-
-
Target
Z_lookup_phone_number_5685021465.apk
-
Size
22.5MB
-
MD5
18f6a38db19b858d1a044cf08e62216d
-
SHA1
c09208f06c8d484072b1e1b4601f85608019b3fe
-
SHA256
701f93961976def77d541a81eed72fd053b862477c64dde1c09a43d85733d85c
-
SHA512
77953f45971ce41e3fd389882e14c59250723c0ab7e5eadbf104d42870e11023400177a281878e20e4ec5a2a30b15b71972f5ff8339ace4efbdde9a3af2e4006
-
SSDEEP
196608:GPIKImxXLJfgG00Lv/t2CrsclY1Sn1GXrAoXZIL6AzsrolgJqp8B1sPU:FKrAG00Ln1dmYWizYroYqp8B1sc
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
2