General

  • Target

    PyGrabber.exe

  • Size

    46KB

  • Sample

    241124-j1z33a1ne1

  • MD5

    9934be2fca82f5d2c76e23816e289e78

  • SHA1

    4d857ca16570c1e9563f989bc00eba57a1f570e9

  • SHA256

    d7431f4441abc86098bee0b76bd07dd6a59d313845d88d246f66de6d2cbc16cb

  • SHA512

    995c58845dbd22f986a72573313896b9d8b2f7e5732da301d6310393753d3e4362373860a12f0084f3eb239435c454f99b1ee219c0e79cf7935364e28477b882

  • SSDEEP

    768:EDf1uZdxCGO1rtQ7YBCuZ1L1+TjXtKZKfgm3Ehq6lnkN0Wkrh:Yaxm1r1BpL1+TztF7Ek6lnxW

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/989605498150092830/I3sJcFFWbTWwsAi6ly8l_n-AJ0DbeIeGdUt5rJnglsUWr5gsPaHLpVae-SL6M8scYn3s

Targets

    • Target

      PyGrabber.exe

    • Size

      46KB

    • MD5

      9934be2fca82f5d2c76e23816e289e78

    • SHA1

      4d857ca16570c1e9563f989bc00eba57a1f570e9

    • SHA256

      d7431f4441abc86098bee0b76bd07dd6a59d313845d88d246f66de6d2cbc16cb

    • SHA512

      995c58845dbd22f986a72573313896b9d8b2f7e5732da301d6310393753d3e4362373860a12f0084f3eb239435c454f99b1ee219c0e79cf7935364e28477b882

    • SSDEEP

      768:EDf1uZdxCGO1rtQ7YBCuZ1L1+TjXtKZKfgm3Ehq6lnkN0Wkrh:Yaxm1r1BpL1+TztF7Ek6lnxW

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks