General

  • Target

    409eed418408597f0a962a72084954fc.zip

  • Size

    203KB

  • Sample

    240901-12d1natajk

  • MD5

    bed2949ce369a8fc5aa9a93e3ba3fafa

  • SHA1

    7140c9f50815d02b1da7b630bc9d2383af6f76fc

  • SHA256

    c1feedddcded1ca54e0ba77d2bb9d31ac61e307e0bf9b04590463e44f8f4b5eb

  • SHA512

    6ef07fdefa4b0a8728ef951216329d1977e5f33402169e94f290dc9a2a06857506d5c9283a30ddfbd1d27fdca41d6187a3df63e237d456319e5a0c951a14c52d

  • SSDEEP

    6144:hK2L6eRSksipP//Wve/6eWuiuORQA/hbYT:hKCRlscvr/6juOrZ6

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/899039214799302707/qsWKqfMDHZvpjKdUaLOScVIgdq1amrTWt3H7cYjN7JYAUUvivw72drT90nFEQohSqE7a

Targets

    • Target

      1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651

    • Size

      302KB

    • MD5

      409eed418408597f0a962a72084954fc

    • SHA1

      138afac3a26afe9ae80c2f4039aa37b683c720a4

    • SHA256

      1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651

    • SHA512

      483cf76c9c59d024491c68bb8678676060e1b375e4b3264aad4a88ef85bb5a300e4210d56d0a3e7677dbf19d101e72b9fd11c8f9a4a91d04234b8fd023eda8a8

    • SSDEEP

      6144:vRCiEKbuoRwE5WTrKi4LnqYkmIRZr/sBrD/jk9jtqpa7xjLazT:dbuoF5ErKNqKIt/0bk9jt4aFw

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks