General

  • Target

    Nexus.zip

  • Size

    18KB

  • Sample

    241217-kx6bcawqdq

  • MD5

    bc9457efb3fd35f6272b812079671373

  • SHA1

    083b4d99f8dd897ad939027f092a4725c1070794

  • SHA256

    59c3b3b8a5be518fa876c8236c97fb5f267ca71f4ed8f68399dc6e58621741aa

  • SHA512

    deb8070618eb49c7b0e72a712d07901268f785d8b182ace85694137846a1d2be6e25b6d98d97a326f242e6e104be2cc4645af3b9e287fd106e4973a70eca7871

  • SSDEEP

    384:hxwixM+nFtfJl8L5f1Gvp+ESd3XJL9BvR0LodB2IP4QmN+tA1:hKi7Q/+Yh3ZRBvR0Cf1a+e1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1318490592392515594/CaM0cAa4-Oi_iXHBiVS9ZB_zIfBiNf-F8okhA3-1UsMnWScS22GWWOOUK0emIKf2VNCQ

Targets

    • Target

      Nexus.zip

    • Size

      18KB

    • MD5

      bc9457efb3fd35f6272b812079671373

    • SHA1

      083b4d99f8dd897ad939027f092a4725c1070794

    • SHA256

      59c3b3b8a5be518fa876c8236c97fb5f267ca71f4ed8f68399dc6e58621741aa

    • SHA512

      deb8070618eb49c7b0e72a712d07901268f785d8b182ace85694137846a1d2be6e25b6d98d97a326f242e6e104be2cc4645af3b9e287fd106e4973a70eca7871

    • SSDEEP

      384:hxwixM+nFtfJl8L5f1Gvp+ESd3XJL9BvR0LodB2IP4QmN+tA1:hKi7Q/+Yh3ZRBvR0Cf1a+e1

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks