General

  • Target

    release1 (1).zip

  • Size

    18KB

  • Sample

    240901-xmd6bsygqk

  • MD5

    c68992259ff797a36c6b91222ea3c380

  • SHA1

    47acfe2e4c2d11072caa74627820e6c34e942fc9

  • SHA256

    409857fbe726ec8a71222081b5d2ff38f6949775913fa24c07aeb7f5779b7607

  • SHA512

    6fb221bed6c3f72b59fa8f9d08126eca4ad0e53c0666e7306bed4dd92a81496958c973a9aed01e4c4ffccd96c192002b5668424cb6bc98581ebc4b217d142e5d

  • SSDEEP

    384:dXzVvkXHU6UYIBQTYKAz5wfRVVAXIeQVCvtFYM/J9d2ivnE9SkKKQA7clPc:thvk39jTWz5wnWYlCf99vniQAIlE

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/1279852929825636517/7lX2aEO7lrNMoPEpMSmCdjN3hbJSXsL6I59yrTwyNVhO7kpK0CSks9fXRfhM5lPYJ0uz

Targets

    • Target

      output.exe

    • Size

      41KB

    • MD5

      8b857cb11e996e19689828dc4eb813e0

    • SHA1

      9ec9217dbf85ca6e6f958aede0d58458bf1c5a0e

    • SHA256

      1c0eea9f988f79c4d6d648efcfa1b9c6e0a930b3f18c2601d2d79dac4e83442c

    • SHA512

      23697a82f8dffebbea6e4f4bd0d90c71d4f6c688f2b9b5689c57116aff6656697eae8ec93c0d97447e29642bb5a937c99c6c0a949a610b81e56f9839579f1f91

    • SSDEEP

      768:MscWcQjfT6axpDXswguZkexWTj6KZKfgm3Ehf1:Dc8fnxEexWT2F7E91

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks