General

  • Target

    Xenith external.exe

  • Size

    464KB

  • Sample

    241201-p89v5asjbt

  • MD5

    e100e653c23372c11cb5f7d2e2aa19cd

  • SHA1

    3cde5da0c33f819bfdbe35217e0dc5b15f8de999

  • SHA256

    3dc8b2b1c3ced9219061ac2d7a000caa6b55d11b9b5588c4f08e3b9d2dbf63b5

  • SHA512

    53b96843996018800bbcfd2f36bc16df5329b6a6f225e5d24b9cc455ed158c352a671b37f0f9b5478ccc098f22ab7793d069a032a5b362eac720acdc594524d4

  • SSDEEP

    12288:s/UltPyOyoAWreyKs/+jJtgJzSOO8Z4zZY6dH:syPylrWrlGjJt8zLO8Z4zZY6dH

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1311424192897618040/nvddKCHqpLtA7pd9-TyyrZ_3e9j8wMmjTjbfWvCd7RK9QAr7enGcgBkVxbBAlPgUCT7x

Targets

    • Target

      Xenith external.exe

    • Size

      464KB

    • MD5

      e100e653c23372c11cb5f7d2e2aa19cd

    • SHA1

      3cde5da0c33f819bfdbe35217e0dc5b15f8de999

    • SHA256

      3dc8b2b1c3ced9219061ac2d7a000caa6b55d11b9b5588c4f08e3b9d2dbf63b5

    • SHA512

      53b96843996018800bbcfd2f36bc16df5329b6a6f225e5d24b9cc455ed158c352a671b37f0f9b5478ccc098f22ab7793d069a032a5b362eac720acdc594524d4

    • SSDEEP

      12288:s/UltPyOyoAWreyKs/+jJtgJzSOO8Z4zZY6dH:syPylrWrlGjJt8zLO8Z4zZY6dH

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks