General

  • Target

    b260f5ae462a0d75e674c84ddca81a77_JaffaCakes118

  • Size

    60KB

  • Sample

    241129-tm14bavla1

  • MD5

    b260f5ae462a0d75e674c84ddca81a77

  • SHA1

    8b574905354e12212fba7a95a946f100f39b652a

  • SHA256

    c978893111234db343df7292a95001b8080fdcb3b873a0f637f372da7d7ce8ee

  • SHA512

    e40b0915473934df8b2e7847675ea801eaf13bac1f9765b8c4e1bf24073756141f95a92c1af8e429f1c90a73a4b5c4d87d7d787ec05f668d4fa4f1a84d26ca5f

  • SSDEEP

    768:ckFRMfauZNLUNTjCCKZKfgm3EhbF6Vi8AnCTMpxY1mnTk6Whm5oP1ZBc:OfhLUNTDF7ERF6VVTMpSmng6UP1D

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/874272273777954866/QqU1LbQRkbqj5OsXKfXP4WJzd0hfF9p5K2VoAR-xR-jvKaYxIH2a2DLogSQEi2DYDqc0

Targets

    • Target

      b260f5ae462a0d75e674c84ddca81a77_JaffaCakes118

    • Size

      60KB

    • MD5

      b260f5ae462a0d75e674c84ddca81a77

    • SHA1

      8b574905354e12212fba7a95a946f100f39b652a

    • SHA256

      c978893111234db343df7292a95001b8080fdcb3b873a0f637f372da7d7ce8ee

    • SHA512

      e40b0915473934df8b2e7847675ea801eaf13bac1f9765b8c4e1bf24073756141f95a92c1af8e429f1c90a73a4b5c4d87d7d787ec05f668d4fa4f1a84d26ca5f

    • SSDEEP

      768:ckFRMfauZNLUNTjCCKZKfgm3EhbF6Vi8AnCTMpxY1mnTk6Whm5oP1ZBc:OfhLUNTDF7ERF6VVTMpSmng6UP1D

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks