Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 17:20
Behavioral task
behavioral1
Sample
PLigma32/ProjectLigmaV2.0.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PLigma32/ProjectLigmaV2.0.0.exe
Resource
win10v2004-20241007-en
General
-
Target
PLigma32/ProjectLigmaV2.0.0.exe
-
Size
217KB
-
MD5
6f01ea85513ed933da12cce31ccb9f3c
-
SHA1
ee7e8adbfd9563cf71b654834756e3117890dff6
-
SHA256
618dda19d824d906de30767c1332b45bd945e83a8dc34f32f74664cb7fba4948
-
SHA512
f440f4fe4c02447d4c292524fc67debb09faf01146408b77eb84833312e0ee3125c55b45cc23e3b0b6ca300de0c2fe31a809004767e9aed6e2c41c91187ccd4d
-
SSDEEP
3072:VrcRLkTCF7E0l3+fqZBI3Ib70yTuZxf3u4CTadMmO8YC+uxFNV9tf6T67NJr0N:eRj5m3IkyTAl3ut2dljB+uxr/t6OPY
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1297265064231043205/XDHM7OLDiEUDyMSpEP52XAoWoKDKd3t7MNGzJiC2bpD_qwj3W3pzZgwHIT-aArktzD8U
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 35 discord.com 36 discord.com 39 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com 3 ip4.seeip.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ProjectLigmaV2.0.0.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ProjectLigmaV2.0.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3428 ProjectLigmaV2.0.0.exe