General

  • Target

    Hey!!!.exe

  • Size

    41KB

  • Sample

    240910-wzfz1syglb

  • MD5

    55c5f01ff22a2415702cbf6b210a9954

  • SHA1

    2f66ae7c3b848054bf90b6ffc127feb0090a72c0

  • SHA256

    2457b90ab234773d6bf523e0fa06294e48d4914bc01b1f290f709ec5f2e7cf42

  • SHA512

    cbce949aa67c70b767600294528caa1708a966eb3135d782163f906c81a4fe630813225fb385ac77696574a4791c9295aeb3b4b4e2178d8212b94b648abf1793

  • SSDEEP

    768:CscaIiIqfT6axpDXswOuZWevWTjjKZKfgm3EhbD:Rc1ofnx8evWT/F7EVD

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1283129065590489211/dEU2uHt9OcimjvWOVka-qrppiq2WKyMjW0QOJzCKDx9yJv76ewzma8jOcUZOGqbMoepy

Targets

    • Target

      Hey!!!.exe

    • Size

      41KB

    • MD5

      55c5f01ff22a2415702cbf6b210a9954

    • SHA1

      2f66ae7c3b848054bf90b6ffc127feb0090a72c0

    • SHA256

      2457b90ab234773d6bf523e0fa06294e48d4914bc01b1f290f709ec5f2e7cf42

    • SHA512

      cbce949aa67c70b767600294528caa1708a966eb3135d782163f906c81a4fe630813225fb385ac77696574a4791c9295aeb3b4b4e2178d8212b94b648abf1793

    • SSDEEP

      768:CscaIiIqfT6axpDXswOuZWevWTjjKZKfgm3EhbD:Rc1ofnx8evWT/F7EVD

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks