General
-
Target
409eed418408597f0a962a72084954fc.zip
-
Size
203KB
-
Sample
240901-12d1natajk
-
MD5
bed2949ce369a8fc5aa9a93e3ba3fafa
-
SHA1
7140c9f50815d02b1da7b630bc9d2383af6f76fc
-
SHA256
c1feedddcded1ca54e0ba77d2bb9d31ac61e307e0bf9b04590463e44f8f4b5eb
-
SHA512
6ef07fdefa4b0a8728ef951216329d1977e5f33402169e94f290dc9a2a06857506d5c9283a30ddfbd1d27fdca41d6187a3df63e237d456319e5a0c951a14c52d
-
SSDEEP
6144:hK2L6eRSksipP//Wve/6eWuiuORQA/hbYT:hKCRlscvr/6juOrZ6
Behavioral task
behavioral1
Sample
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/899039214799302707/qsWKqfMDHZvpjKdUaLOScVIgdq1amrTWt3H7cYjN7JYAUUvivw72drT90nFEQohSqE7a
Targets
-
-
Target
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651
-
Size
302KB
-
MD5
409eed418408597f0a962a72084954fc
-
SHA1
138afac3a26afe9ae80c2f4039aa37b683c720a4
-
SHA256
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651
-
SHA512
483cf76c9c59d024491c68bb8678676060e1b375e4b3264aad4a88ef85bb5a300e4210d56d0a3e7677dbf19d101e72b9fd11c8f9a4a91d04234b8fd023eda8a8
-
SSDEEP
6144:vRCiEKbuoRwE5WTrKi4LnqYkmIRZr/sBrD/jk9jtqpa7xjLazT:dbuoF5ErKNqKIt/0bk9jt4aFw
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1