General

  • Target

    Nexus.zip

  • Size

    18KB

  • Sample

    241217-k4ag9awrbm

  • MD5

    bc9457efb3fd35f6272b812079671373

  • SHA1

    083b4d99f8dd897ad939027f092a4725c1070794

  • SHA256

    59c3b3b8a5be518fa876c8236c97fb5f267ca71f4ed8f68399dc6e58621741aa

  • SHA512

    deb8070618eb49c7b0e72a712d07901268f785d8b182ace85694137846a1d2be6e25b6d98d97a326f242e6e104be2cc4645af3b9e287fd106e4973a70eca7871

  • SSDEEP

    384:hxwixM+nFtfJl8L5f1Gvp+ESd3XJL9BvR0LodB2IP4QmN+tA1:hKi7Q/+Yh3ZRBvR0Cf1a+e1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1318490592392515594/CaM0cAa4-Oi_iXHBiVS9ZB_zIfBiNf-F8okhA3-1UsMnWScS22GWWOOUK0emIKf2VNCQ

Targets

    • Target

      Nexus/Nexus Executor.exe

    • Size

      41KB

    • MD5

      a586b36675aec8a5c6ed50e92d388784

    • SHA1

      68aa3dc9f30bfe1106f5d674a7d44b995879aa24

    • SHA256

      3ade02051c85f82194e21864aac14868db1d62e925bf66c0ec3a537637ebdaee

    • SHA512

      b69ac478c26ee6fbbcbdf4b94dd585e9263b51173e8f2f4b8032d7d5421605872a5d3eff3c0fc32fc9e281f0bad9f5471c4ed1543967b1b7935ff14ba57dcba6

    • SSDEEP

      768:3scaIyIB+ntOwEuZge5WTjQKZKfgm3Eh5s:cc1X+Oe5WTkF7Ers

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks