General

  • Target

    18111a8a5502866035b5367f0783cc0deca5d30de05f6dc5099d06b36e8b5a36N

  • Size

    108KB

  • Sample

    241007-csswfstfqg

  • MD5

    60354d36209205ff6922671b05ffa860

  • SHA1

    00c4b8bd97bf2afc1100e1e1714298a69cfb41ff

  • SHA256

    18111a8a5502866035b5367f0783cc0deca5d30de05f6dc5099d06b36e8b5a36

  • SHA512

    cf827ed6e29860fb50a44d6afd8e95cdda647dc91d233c90164fbb060c00645ca04ba5acd70c453c151ee9b4ac0707f0bd1c3db82bf855dcac479890d3450bef

  • SSDEEP

    768:fO+85OK4woge5b0luZALRGDTjbKZKfgm3EhW9ca:WwWlLRGDTXF7EE9ca

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1287071639615438931/5VUHCc3A_ukqrsGUnk3_ghY2R8uuVmUjGD4Nd5qOpXQdsGnCOvfsHmuNmTNRzl2MTIcu

Targets

    • Target

      18111a8a5502866035b5367f0783cc0deca5d30de05f6dc5099d06b36e8b5a36N

    • Size

      108KB

    • MD5

      60354d36209205ff6922671b05ffa860

    • SHA1

      00c4b8bd97bf2afc1100e1e1714298a69cfb41ff

    • SHA256

      18111a8a5502866035b5367f0783cc0deca5d30de05f6dc5099d06b36e8b5a36

    • SHA512

      cf827ed6e29860fb50a44d6afd8e95cdda647dc91d233c90164fbb060c00645ca04ba5acd70c453c151ee9b4ac0707f0bd1c3db82bf855dcac479890d3450bef

    • SSDEEP

      768:fO+85OK4woge5b0luZALRGDTjbKZKfgm3EhW9ca:WwWlLRGDTXF7EE9ca

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks