General

  • Target

    test.exe

  • Size

    42KB

  • Sample

    241108-11ynns1cnr

  • MD5

    d5e9991247e5cb48ed27fd5e5320fcc6

  • SHA1

    938ac67b8d6ed60e4dfa624c69ed2b706c32d02c

  • SHA256

    86c6d6e8e052d22debffda8af52364bd3d41a6b62d5f59a1ae89c9a8e09605d5

  • SHA512

    e632fd39a95f579ecdb19793c4acc96f79faa88f02ee4dc935289252b608a8b8570ac07c04a182700672d80d8ccd582a2ac9bea64b30f9d657f8c85deff163e9

  • SSDEEP

    768:PBtKq9oge5b0kuZBLhATj2KZKfgm3EhJ6l:PSWLLhATCF7En6l

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1304560688261238805/v1GB_2dYhNJm9UtnSiPcmbUwZA34Y8McYsFALV0coV5nu7JBKINo7348pjVp03vbR-Bh

Targets

    • Target

      test.exe

    • Size

      42KB

    • MD5

      d5e9991247e5cb48ed27fd5e5320fcc6

    • SHA1

      938ac67b8d6ed60e4dfa624c69ed2b706c32d02c

    • SHA256

      86c6d6e8e052d22debffda8af52364bd3d41a6b62d5f59a1ae89c9a8e09605d5

    • SHA512

      e632fd39a95f579ecdb19793c4acc96f79faa88f02ee4dc935289252b608a8b8570ac07c04a182700672d80d8ccd582a2ac9bea64b30f9d657f8c85deff163e9

    • SSDEEP

      768:PBtKq9oge5b0kuZBLhATj2KZKfgm3EhJ6l:PSWLLhATCF7En6l

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks