General
-
Target
optimization.exe
-
Size
68KB
-
Sample
240825-yeq1la1eld
-
MD5
51d9d0a93081b537227b1a2ab44dc507
-
SHA1
c2cbb6e76cc2a6b31065a5eb1bf19ee1600c0c58
-
SHA256
5ec5f86f35a06554caedf23c766ad317fdc9eba5fb1242e063459d6d60dd805e
-
SHA512
89664bfc3395584e1cc6a2264ecb2e7995750309eba0416ddcc51d55fe5e659e80e30c5b2ade372e27941921e755b5fad04a052fe88b82fcdb2c89298dbf820e
-
SSDEEP
768:c2CZ9QLvnDylOcluZuLwnpTj9KZKfgm3Ehq5x/fK:c7AjnD9c7LwpTZF7EcPnK
Behavioral task
behavioral1
Sample
optimization.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
optimization.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1277341597796925543/uBiSQjMIcZSjiE58SS7EsUdcpaONS8BCEIDgfigLN8z84blntDHVG1OHQj01TuM0t1rL
Targets
-
-
Target
optimization.exe
-
Size
68KB
-
MD5
51d9d0a93081b537227b1a2ab44dc507
-
SHA1
c2cbb6e76cc2a6b31065a5eb1bf19ee1600c0c58
-
SHA256
5ec5f86f35a06554caedf23c766ad317fdc9eba5fb1242e063459d6d60dd805e
-
SHA512
89664bfc3395584e1cc6a2264ecb2e7995750309eba0416ddcc51d55fe5e659e80e30c5b2ade372e27941921e755b5fad04a052fe88b82fcdb2c89298dbf820e
-
SSDEEP
768:c2CZ9QLvnDylOcluZuLwnpTj9KZKfgm3Ehq5x/fK:c7AjnD9c7LwpTZF7EcPnK
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-