General
-
Target
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118
-
Size
58KB
-
Sample
240908-3e7qkatanc
-
MD5
d5481b1558c02cc5b27eea52074e0d08
-
SHA1
a1eff2bf50c1323a8beb7b0e60f39e14a81b224d
-
SHA256
f54dd71bb0feb30a19123b93cc9ce60b3d6e603b9b5967c472b8cc35d9618c12
-
SHA512
4aa8cb795cc3d3fce1905ef7e3ea6f497e9c5be9e4fce188aa385b31b003ae1f403cf84bd14385f86149f47551b68ef2668b322bd39197b978fe60df6b3828ec
-
SSDEEP
1536:kk/MJnS3kgqrYMLDdAg7w9fQ65aXPrB72nkW:/kJnS0gQX5J7w9fjafrBykW
Static task
static1
Behavioral task
behavioral1
Sample
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/888502856733294672/TOj_bSh6Zkm2K7SzTPO616Cabe61-suc7UYdT52jA3Da2mmB2WhCEsY9-w2h5G8rjsRY
Targets
-
-
Target
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118
-
Size
58KB
-
MD5
d5481b1558c02cc5b27eea52074e0d08
-
SHA1
a1eff2bf50c1323a8beb7b0e60f39e14a81b224d
-
SHA256
f54dd71bb0feb30a19123b93cc9ce60b3d6e603b9b5967c472b8cc35d9618c12
-
SHA512
4aa8cb795cc3d3fce1905ef7e3ea6f497e9c5be9e4fce188aa385b31b003ae1f403cf84bd14385f86149f47551b68ef2668b322bd39197b978fe60df6b3828ec
-
SSDEEP
1536:kk/MJnS3kgqrYMLDdAg7w9fQ65aXPrB72nkW:/kJnS0gQX5J7w9fjafrBykW
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-