General

  • Target

    Run as Admin.EXE

  • Size

    46KB

  • MD5

    d41840bc306ceefcebdaa0bfb9e32b3f

  • SHA1

    2914f9b32d0935c567a2308fc4ddc268428fb86a

  • SHA256

    750f3b5977862ab0fdd2cc36552e4b8d88e72996d8a4fd086780f29708683a13

  • SHA512

    574ac54d66fdebd5b057be40e87dde8d4e5d379b0b09faf9be9ab5c1faa68509e0b60468daca0c26915eec0aaa754adf63d170d50c6d971f3831d00867d2f6e3

  • SSDEEP

    768:MLW02sUfNT/auZIL8dTj/KZKfgm3EhycZBSZqar:M3HUfNT/sL8dT7F7EAAAZqa

Score
10/10

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/979830528649879562/7TPmI8ZJFLQtciYhdIXTaOGL0qIATzyGETuwIZ4-vVBvkwxLoWDIzz59PD7LdqD63RWs

Signatures

  • Mercurialgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Run as Admin.EXE
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections