General

  • Target

    Run as Admin.EXE

  • Size

    46KB

  • Sample

    241013-wrhhwavcpl

  • MD5

    d41840bc306ceefcebdaa0bfb9e32b3f

  • SHA1

    2914f9b32d0935c567a2308fc4ddc268428fb86a

  • SHA256

    750f3b5977862ab0fdd2cc36552e4b8d88e72996d8a4fd086780f29708683a13

  • SHA512

    574ac54d66fdebd5b057be40e87dde8d4e5d379b0b09faf9be9ab5c1faa68509e0b60468daca0c26915eec0aaa754adf63d170d50c6d971f3831d00867d2f6e3

  • SSDEEP

    768:MLW02sUfNT/auZIL8dTj/KZKfgm3EhycZBSZqar:M3HUfNT/sL8dT7F7EAAAZqa

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/979830528649879562/7TPmI8ZJFLQtciYhdIXTaOGL0qIATzyGETuwIZ4-vVBvkwxLoWDIzz59PD7LdqD63RWs

Targets

    • Target

      Run as Admin.EXE

    • Size

      46KB

    • MD5

      d41840bc306ceefcebdaa0bfb9e32b3f

    • SHA1

      2914f9b32d0935c567a2308fc4ddc268428fb86a

    • SHA256

      750f3b5977862ab0fdd2cc36552e4b8d88e72996d8a4fd086780f29708683a13

    • SHA512

      574ac54d66fdebd5b057be40e87dde8d4e5d379b0b09faf9be9ab5c1faa68509e0b60468daca0c26915eec0aaa754adf63d170d50c6d971f3831d00867d2f6e3

    • SSDEEP

      768:MLW02sUfNT/auZIL8dTj/KZKfgm3EhycZBSZqar:M3HUfNT/sL8dT7F7EAAAZqa

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks