General
-
Target
output.exe
-
Size
41KB
-
Sample
241122-bb8d5s1kez
-
MD5
a0e598ec98a975405420be1aadaa3c2a
-
SHA1
d861788839cfb78b5203686334c1104165ea0937
-
SHA256
e6ac8a6dac77f9873024f50befb293b9cf6347aa2e093cd863b551d9c8da5f8d
-
SHA512
e5ee500a8dcddd72e727cfa24e51093cd2b088f7ef89089f1d24145baa41c1ac46bf6be73bfd8cb15e2549349da8c2547d4e391b6e3a456621524fe0f83f9585
-
SSDEEP
768:DscWsQjfT6aGpDXswguZkeAWTjVKZKfgm3Ehq1:Yc8fnGEeAWTJF7E41
Behavioral task
behavioral1
Sample
output.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/1308883657456619530/0_Ad9EyrLZrIMKH4vjM6XHyvCJJtKddsiohDSyvCWZ8HIxpyNxmVJgrKb_zO-jqSHSO0
Targets
-
-
Target
output.exe
-
Size
41KB
-
MD5
a0e598ec98a975405420be1aadaa3c2a
-
SHA1
d861788839cfb78b5203686334c1104165ea0937
-
SHA256
e6ac8a6dac77f9873024f50befb293b9cf6347aa2e093cd863b551d9c8da5f8d
-
SHA512
e5ee500a8dcddd72e727cfa24e51093cd2b088f7ef89089f1d24145baa41c1ac46bf6be73bfd8cb15e2549349da8c2547d4e391b6e3a456621524fe0f83f9585
-
SSDEEP
768:DscWsQjfT6aGpDXswguZkeAWTjVKZKfgm3Ehq1:Yc8fnGEeAWTJF7E41
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1