General

  • Target

    aslocs fornite private.exe

  • Size

    42KB

  • Sample

    241201-az39navpdp

  • MD5

    35b0e8ef8de9e7393fd78f2343de3306

  • SHA1

    a9327f2b2588a1cda883fcbc0fccecc6dafc090c

  • SHA256

    a99582c7eed4c60e902bc1d337d940a7b4bd51eeb2446d36c2c0a00e557d5e69

  • SHA512

    7f05a9b2aea4e3466387004167591aa6d8bbec805740015e9f984340cf1e835ce033173366c8ba59c9fa0c352cc2dec10d59951acd8ed0d56b66945949b6c369

  • SSDEEP

    768:dDkeaGY32DrYLb5zV3iHuZqLxLTjaKZKfgm3EhVN:dDkeaGY339zV3i5LxLTuF7ELN

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1312576996676735026/0WSfXBg86sbY5a_fCBw_VLk8b6d2IwvDHbVhu2myV5U3i9chwzDSpBiwVypg7K1zPX3-

Targets

    • Target

      aslocs fornite private.exe

    • Size

      42KB

    • MD5

      35b0e8ef8de9e7393fd78f2343de3306

    • SHA1

      a9327f2b2588a1cda883fcbc0fccecc6dafc090c

    • SHA256

      a99582c7eed4c60e902bc1d337d940a7b4bd51eeb2446d36c2c0a00e557d5e69

    • SHA512

      7f05a9b2aea4e3466387004167591aa6d8bbec805740015e9f984340cf1e835ce033173366c8ba59c9fa0c352cc2dec10d59951acd8ed0d56b66945949b6c369

    • SSDEEP

      768:dDkeaGY32DrYLb5zV3iHuZqLxLTjaKZKfgm3EhVN:dDkeaGY339zV3i5LxLTuF7ELN

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks