General
-
Target
Nexus.zip
-
Size
18KB
-
Sample
241217-kx6bcawqdq
-
MD5
bc9457efb3fd35f6272b812079671373
-
SHA1
083b4d99f8dd897ad939027f092a4725c1070794
-
SHA256
59c3b3b8a5be518fa876c8236c97fb5f267ca71f4ed8f68399dc6e58621741aa
-
SHA512
deb8070618eb49c7b0e72a712d07901268f785d8b182ace85694137846a1d2be6e25b6d98d97a326f242e6e104be2cc4645af3b9e287fd106e4973a70eca7871
-
SSDEEP
384:hxwixM+nFtfJl8L5f1Gvp+ESd3XJL9BvR0LodB2IP4QmN+tA1:hKi7Q/+Yh3ZRBvR0Cf1a+e1
Behavioral task
behavioral1
Sample
Nexus.zip
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1318490592392515594/CaM0cAa4-Oi_iXHBiVS9ZB_zIfBiNf-F8okhA3-1UsMnWScS22GWWOOUK0emIKf2VNCQ
Targets
-
-
Target
Nexus.zip
-
Size
18KB
-
MD5
bc9457efb3fd35f6272b812079671373
-
SHA1
083b4d99f8dd897ad939027f092a4725c1070794
-
SHA256
59c3b3b8a5be518fa876c8236c97fb5f267ca71f4ed8f68399dc6e58621741aa
-
SHA512
deb8070618eb49c7b0e72a712d07901268f785d8b182ace85694137846a1d2be6e25b6d98d97a326f242e6e104be2cc4645af3b9e287fd106e4973a70eca7871
-
SSDEEP
384:hxwixM+nFtfJl8L5f1Gvp+ESd3XJL9BvR0LodB2IP4QmN+tA1:hKi7Q/+Yh3ZRBvR0Cf1a+e1
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1