General
-
Target
https://mega.nz/file/1r1CwJbR#7Xb5BkhkW-7DqeVcXllurahYhNTWimhjyF_ClbcH6q4
-
Sample
240901-xb6q7szala
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/1r1CwJbR#7Xb5BkhkW-7DqeVcXllurahYhNTWimhjyF_ClbcH6q4
Resource
win10v2004-20240802-en
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/1279852929825636517/7lX2aEO7lrNMoPEpMSmCdjN3hbJSXsL6I59yrTwyNVhO7kpK0CSks9fXRfhM5lPYJ0uz
Targets
-
-
Target
https://mega.nz/file/1r1CwJbR#7Xb5BkhkW-7DqeVcXllurahYhNTWimhjyF_ClbcH6q4
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-