General

  • Target

    fn acc gen.exe

  • Size

    162KB

  • Sample

    241130-mpr5vswlhk

  • MD5

    3f5779efee67128a8e65f852416a1f0c

  • SHA1

    5ffcb2e4f5572c2810decdbdd319506594caf1f7

  • SHA256

    7219d02197027629ab7d87710ac65e091b9ab3e78673328d0082038a17b0eb37

  • SHA512

    4cc553a44ebf1d5c5089215e2dc201f91a91660fc766dc5e8bb1a853c4bfaa9558e5be3d8c208dc17aba3e5a936abfe0a9e610044db32e856b559fe0319ee6ed

  • SSDEEP

    1536:WcFIr2RVeDHWToF7EWyXC2DddrM6N6C0f/9J3VJsnkwCHXEEEE9QxqV4Oic1:XxRVeqToF7EBXCArZI3KaQlOiO

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/924451258591485993/JyCqNBCgVevF8igfGtv_fng3Q8Mx1Xkal-W61Hli2GrTCMzpctHcxGYUXZrZ0wTbejHY

Targets

    • Target

      fn acc gen.exe

    • Size

      162KB

    • MD5

      3f5779efee67128a8e65f852416a1f0c

    • SHA1

      5ffcb2e4f5572c2810decdbdd319506594caf1f7

    • SHA256

      7219d02197027629ab7d87710ac65e091b9ab3e78673328d0082038a17b0eb37

    • SHA512

      4cc553a44ebf1d5c5089215e2dc201f91a91660fc766dc5e8bb1a853c4bfaa9558e5be3d8c208dc17aba3e5a936abfe0a9e610044db32e856b559fe0319ee6ed

    • SSDEEP

      1536:WcFIr2RVeDHWToF7EWyXC2DddrM6N6C0f/9J3VJsnkwCHXEEEE9QxqV4Oic1:XxRVeqToF7EBXCArZI3KaQlOiO

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks