Resubmissions

18-08-2024 11:58

240818-n5ltfssgpb 10

09-08-2024 18:46

240809-xe5nbathlk 10

09-08-2024 17:51

240809-wfdesaxcqh 10

09-08-2024 17:48

240809-wdej3axcpf 10

09-08-2024 17:46

240809-wcf2haxcpc 10

General

  • Target

    Garnacho.exe

  • Size

    42KB

  • Sample

    240809-xe5nbathlk

  • MD5

    86f50736cb36ef4c1f635480221db309

  • SHA1

    4e1a9cee359def9f13a9526e6777433df44448d4

  • SHA256

    e1d670f21441ec457fe5c3469781c101c36b4fe04b2ffc1a2e89eb630ff0165a

  • SHA512

    656f582f51531bf0d23d0b17eed991b2286504d69a13c431adfd391c81f32718775d934711af897db0670771c0f9bb51f8fc44b6486351f275b52bbebc0067e3

  • SSDEEP

    768:ciSb4etQDGm88uZGLTOTjGKZKfgm3Ehcy:ct4SQD84LTOTyF7ESy

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1271524572986081351/vNrcEfNWPV35KkYiGtVh2NaZB_4a4uGfbaOAe2oVr7jGqwHkIB78Aj1CzHbPqMm3KbjD

Targets

    • Target

      Garnacho.exe

    • Size

      42KB

    • MD5

      86f50736cb36ef4c1f635480221db309

    • SHA1

      4e1a9cee359def9f13a9526e6777433df44448d4

    • SHA256

      e1d670f21441ec457fe5c3469781c101c36b4fe04b2ffc1a2e89eb630ff0165a

    • SHA512

      656f582f51531bf0d23d0b17eed991b2286504d69a13c431adfd391c81f32718775d934711af897db0670771c0f9bb51f8fc44b6486351f275b52bbebc0067e3

    • SSDEEP

      768:ciSb4etQDGm88uZGLTOTjGKZKfgm3Ehcy:ct4SQD84LTOTyF7ESy

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks