General

  • Target

    82eaa69b588899fb845faabed20123055746989cf83a44579eb0ba808b359fc3.exe

  • Size

    57KB

  • Sample

    241120-z6y1ystmby

  • MD5

    8b7b2c842c8533f4c815bf431181196c

  • SHA1

    af2422be2d84376cf4fbff1165accf44549108c7

  • SHA256

    82eaa69b588899fb845faabed20123055746989cf83a44579eb0ba808b359fc3

  • SHA512

    b07db555fb6fe73c7066e7c93a894014d64554bb284d0d43f556786c06836e1b41c22daa4e322dc6eb97d2afe4f07a40f468bd276b8609abc6ab1b3604276a21

  • SSDEEP

    768:yrLfRHhf9uZ+LMmTjWKZKfgm3EhI99clYC3VVyAfe42TevR7um:yBhfJLMmTaF7Ei99cLVVx0T8BN

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/898889485121646654/Xxon9mS9UonT3xyMDqO6eCIMgJjH0-mL9tBhX80ege_hMkOEMEtFNtSz1AyiX_Adui_Y

Targets

    • Target

      82eaa69b588899fb845faabed20123055746989cf83a44579eb0ba808b359fc3.exe

    • Size

      57KB

    • MD5

      8b7b2c842c8533f4c815bf431181196c

    • SHA1

      af2422be2d84376cf4fbff1165accf44549108c7

    • SHA256

      82eaa69b588899fb845faabed20123055746989cf83a44579eb0ba808b359fc3

    • SHA512

      b07db555fb6fe73c7066e7c93a894014d64554bb284d0d43f556786c06836e1b41c22daa4e322dc6eb97d2afe4f07a40f468bd276b8609abc6ab1b3604276a21

    • SSDEEP

      768:yrLfRHhf9uZ+LMmTjWKZKfgm3EhI99clYC3VVyAfe42TevR7um:yBhfJLMmTaF7Ei99cLVVx0T8BN

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks