General

  • Target

    bde2ba59-239b-ec80-c564-17b1037f442c.zip

  • Size

    41KB

  • Sample

    240901-2dm44avalb

  • MD5

    2c5e8e14b7fda2d9d43254e87b750c6f

  • SHA1

    7de985339401cf0ed0f4455eae8b16ca9a993b60

  • SHA256

    fb200ebf103e46e21cb501e72f9f82ebff44664903fd97a1c7488ad562b7aac5

  • SHA512

    52d8f7681a7362a76fcac566e893f6f5d7e33ab1e01159c10d06f457eaf294c4bada0b24e9a459a06f8c1f04672a1c7aa95ffcc68e244d90e4c5e919b8329b24

  • SSDEEP

    768:9scaIiID3mbWMABWawquZsezWTjgKZKfgm3EhfJUM:6c1N3mWM8WqezWTUF7EJJUM

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1279557394677895311/Sw4EvWiW4SbcOzSCej18SukPQF-M_rfa5znh9fESXm95kIknSnlBrm_lJ_g-PFSoTKMc

Targets

    • Target

      mercurial.executor.v1.03.exe

    • Size

      41KB

    • MD5

      e8bd6fc19c460f8a5e45432de659a9a3

    • SHA1

      26d2120bb2cfa892de9e383bb73cb8b3cd245194

    • SHA256

      cd3434f7234e702d5be5327a7227743281e00caa4b3e4c09f43889ec3177b0e4

    • SHA512

      fb218732cafa170efa0df1e0a14890e343db7df88898e425f795d13079caf7f95a6917c455f835165c61ff609e2ffe059dd528df748a5c96a77b4f4ab65380af

    • SSDEEP

      768:VscaIiID3mbWMABWawquZsezWTjgKZKfgm3EhfJ:Cc1N3mWM8WqezWTUF7EJJ

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks