General

  • Target

    bootstrapperv1.19.rar

  • Size

    17KB

  • Sample

    240922-yv9gwavhlc

  • MD5

    e228a8eeb62a5eb27f72ee19b821c706

  • SHA1

    f420dc51fb9e57b129c60c0eef80fc3690cdd177

  • SHA256

    5864f78572cb77005fa146aec87f5c3e119827a63f69f7d500a6e7099a532a53

  • SHA512

    d37f36008dcaa858e332bf2016d41df1d822ed35f0579cb9e8da643359c0135b5f625051381b1a72ad263b72863e2dc68e44059d26ba8a2875dcb2ec61887a32

  • SSDEEP

    384:60WZNFIT1ajevSU9Sr5OxAN7FfxB7UOpo/auYYHLqEscFViN0DKi+:xWBY1zRcr5OxQpCOMgYrqEdHBDK1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/1287494730313367614/ADttPZV4JMT077jKqJ1N8O9urk62UJzmFZVMMTu_q-b-4ZuAjiwG2hAFrvkr4NyoNiSO

Targets

    • Target

      bootstrapper v1.19..exe

    • Size

      42KB

    • MD5

      1979f144e30fe9e04df51876f532b1c4

    • SHA1

      57e431cde2459081cdd6f2b6a5e9748bc5ceec72

    • SHA256

      5b3e72313df5dbb66249aa2f961454f2afa4afbcf740bf6d8d511877d6c907ea

    • SHA512

      090249dfc3d4c98b38d5b08b0fbbfbed99a155c30e78dcc78db59ebacf621c81ea198bee4c10de359a99d3ed8cbba47cb835a6d4b6c58b37553e7b0d06a2ec98

    • SSDEEP

      768:edZds7EKfDxJuZnLrUTjT/KZKfgm3EhSs:eG7EKfDxwLrUT//F7EYs

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks