General

  • Target

    xss.exe

  • Size

    41KB

  • Sample

    241005-wzszksydpr

  • MD5

    8c8462f77d7da933e773217543875242

  • SHA1

    600481ffce0ec20d647a563f68ed7c42c99d79bc

  • SHA256

    7c5bdc508e740b5477871d8fbded196a6e66b240356165d516e566bdf6d8aa08

  • SHA512

    aebcf476e7fd6ae619fa483b2c33cedf7175f3da5381ad4ab2efbaafe61b3d006b7ecee6d932d93533df717cb2a4d67f03c7beba775821a145519dd9bca06dfe

  • SSDEEP

    768:UscabfwOAPfT6axpDXswguZkeEWTj7KZKfgm3EhR1:7cIkfnxEeEWTXF7Ev1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/932314974821416980/osLcs7_JnbCl3GNDJZN2PxdF0np-7hpN0orKxo5zZk82dncLriutJ3OKggCDNXZwDzgK

Targets

    • Target

      xss.exe

    • Size

      41KB

    • MD5

      8c8462f77d7da933e773217543875242

    • SHA1

      600481ffce0ec20d647a563f68ed7c42c99d79bc

    • SHA256

      7c5bdc508e740b5477871d8fbded196a6e66b240356165d516e566bdf6d8aa08

    • SHA512

      aebcf476e7fd6ae619fa483b2c33cedf7175f3da5381ad4ab2efbaafe61b3d006b7ecee6d932d93533df717cb2a4d67f03c7beba775821a145519dd9bca06dfe

    • SSDEEP

      768:UscabfwOAPfT6axpDXswguZkeEWTj7KZKfgm3EhR1:7cIkfnxEeEWTXF7Ev1

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks