Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 14:39
Behavioral task
behavioral1
Sample
dgfdgdfgd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
dgfdgdfgd.exe
Resource
win10v2004-20240802-en
General
-
Target
dgfdgdfgd.exe
-
Size
42KB
-
MD5
36c90b68ab72ea83dc82c14bf6e9c2be
-
SHA1
77146308f17fd04154d4a8c8a01007dc9751ca24
-
SHA256
db434dc504c1bd8629cbece2f8eabbbb7a117afc1fe0122f17b0f05ee5475206
-
SHA512
8f827f1689690fe321ddc0830ec1314af1feef662f7184892ad36f9f94d9bdca749260787bf7682a2c6a19f6235d76868a44c372dc3970cb20ec280758fd2a93
-
SSDEEP
768:Mlf2YdxCGPQ7YBjuZULKyTjK+KZKfgm3EhGNvI:+xfBNLKyT++F7EQt
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1279811717064298516/LM9QiJBoWZBrAcu-UtYHyKA5Pmpx3LQZ5AG3Hy0Wlj8vMTk-O_wqaHG4FPXD9lG_xxdb
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 75 discord.com 35 discord.com 36 discord.com 37 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip4.seeip.org 33 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dgfdgdfgd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dgfdgdfgd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4828 dgfdgdfgd.exe