General

  • Target

    7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118

  • Size

    42KB

  • Sample

    241030-an81rs1pcz

  • MD5

    7d4024c808e3260b6758e2ccbbbf39a1

  • SHA1

    cfdf9e2f7906c2bb545a2ed31ec99cc56110268c

  • SHA256

    3f3ba0a078fe46dad2725317af4356eca4840380ac34d34c32f2709b9d56e541

  • SHA512

    0887794a3e6333bad228ecab2e1324110b56038efe9c6cf4ffed8b260e7c015c19ba166aeac164e6d340906c4b98043f55fb0b9cabd3b1f0db44b298a261156a

  • SSDEEP

    384:zx65RYv2J4hIIFt5raNRWgxfYTx3s/XZxIh/YoJEFq5nm9BTAsbKQsLd/SfgUfA6:we9xCRWfRuZqLYBTjbKZKfgm3Ehmp

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/854748062370103318/s6gChj_BDPlpnf9aZuoxHbunaWMu4111E-5Br1rr_A19cJENTEiyVR6LD0FKWOp4WqzD

Targets

    • Target

      7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118

    • Size

      42KB

    • MD5

      7d4024c808e3260b6758e2ccbbbf39a1

    • SHA1

      cfdf9e2f7906c2bb545a2ed31ec99cc56110268c

    • SHA256

      3f3ba0a078fe46dad2725317af4356eca4840380ac34d34c32f2709b9d56e541

    • SHA512

      0887794a3e6333bad228ecab2e1324110b56038efe9c6cf4ffed8b260e7c015c19ba166aeac164e6d340906c4b98043f55fb0b9cabd3b1f0db44b298a261156a

    • SSDEEP

      384:zx65RYv2J4hIIFt5raNRWgxfYTx3s/XZxIh/YoJEFq5nm9BTAsbKQsLd/SfgUfA6:we9xCRWfRuZqLYBTjbKZKfgm3Ehmp

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks