General

  • Target

    Bootstrapper.exe

  • Size

    42KB

  • MD5

    1aca625634c8effa377b59d1813b02d3

  • SHA1

    028a7beb91e7b717fd01d69aa13ee274fb033a20

  • SHA256

    5894df88916db05950de2cbd1ea4f34300e82c2867e18ef74fdad41764bcd80c

  • SHA512

    def567568ce7269a720b4cfe8bcd25f1e55c465773e7442c7286a37544964430d1637f7414841361dbac537ebdf2678a96166d7dae8e4a5888035095c5c3ad97

  • SSDEEP

    768:nPS0LvnDylOc1uZiLM8TjOKZKfgm3EhoV:RjnD9cTLM8TaF7ESV

Score
10/10

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1271473528654401586/rFfdmhvGeSTR5U0D1W7z9AJRgEpjDxyMIXGdCWGpCfaxSBpeVQLqtnYlQbfJ3OuQX4-u

Signatures

  • Mercurialgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Bootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections