Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    7a10012bc5a1707274d7666ebffa6750N.exe

  • Size

    161KB

  • Sample

    240907-fagbgsvfrn

  • MD5

    7a10012bc5a1707274d7666ebffa6750

  • SHA1

    d62b93adaf73e8cb52f93ad5524531ccd120805e

  • SHA256

    cb334e7fbd7d1450caaaa28e6140a10e39ea691a557c41e0f0641944ed1bda43

  • SHA512

    d0495a86afd6430372dc935b030b342c3b62ff70180114932880650fc9cd538275206270304936f9bb47a55a1073766d611645b7e53a81006bca5a907345274c

  • SSDEEP

    1536:aKZNLrqTTF7Ey6F96MzjcrkJeE3c73JnOIlshT8CqpmTwiRg:asNLOTTF7Ey636MvqQH3c7En

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1279123272776155177/l5PXrm5yd94Ull6r2znR-2luVNy6CON_NF_r34Km7lMNgjn0CFNUUmBT1U9tnnds1dN2

Targets

    • Target

      7a10012bc5a1707274d7666ebffa6750N.exe

    • Size

      161KB

    • MD5

      7a10012bc5a1707274d7666ebffa6750

    • SHA1

      d62b93adaf73e8cb52f93ad5524531ccd120805e

    • SHA256

      cb334e7fbd7d1450caaaa28e6140a10e39ea691a557c41e0f0641944ed1bda43

    • SHA512

      d0495a86afd6430372dc935b030b342c3b62ff70180114932880650fc9cd538275206270304936f9bb47a55a1073766d611645b7e53a81006bca5a907345274c

    • SSDEEP

      1536:aKZNLrqTTF7Ey6F96MzjcrkJeE3c73JnOIlshT8CqpmTwiRg:asNLOTTF7Ey636MvqQH3c7En

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.