General

  • Target

    compiled.exe

  • Size

    6.8MB

  • Sample

    240901-v3lt1axbqj

  • MD5

    c1e823d291b110620f2b9743839fcbbc

  • SHA1

    848e58840e5773212341371bee614359b38b2d00

  • SHA256

    3366c54b59efb7c0db35301edceaab68ac442400ec0ee0e8f985513212c982ef

  • SHA512

    a71452c18731b81d03230048c6e5433af4f029123460d67ae0a76a8bc9142830f210e0b3bc1433ba30fa9c2d683990f94bbc1b5a2d056deb6e4bbd30b995f948

  • SSDEEP

    196608:r1/ESclZhweCrMjbJp2O5xsKGluUGNrUcGown6:r1fcjmrMf+O5xsxaocGk

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1279845453336412260/A8ZEV41SqZhlDM114ONplW6YO3ItmaeJxvYHi-I4t5Fx0r_sBuCyg8RH2hoVGdxkr27c

Targets

    • Target

      compiled.exe

    • Size

      6.8MB

    • MD5

      c1e823d291b110620f2b9743839fcbbc

    • SHA1

      848e58840e5773212341371bee614359b38b2d00

    • SHA256

      3366c54b59efb7c0db35301edceaab68ac442400ec0ee0e8f985513212c982ef

    • SHA512

      a71452c18731b81d03230048c6e5433af4f029123460d67ae0a76a8bc9142830f210e0b3bc1433ba30fa9c2d683990f94bbc1b5a2d056deb6e4bbd30b995f948

    • SSDEEP

      196608:r1/ESclZhweCrMjbJp2O5xsKGluUGNrUcGown6:r1fcjmrMf+O5xsxaocGk

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks