General

  • Target

    JaffaCakes118_5ff7082170d06e0244014d993a3a26f8dafbb00e

  • Size

    17KB

  • Sample

    241222-chxfwsyqgk

  • MD5

    4aa2a0741f77030ca6e522b3d2a77dfa

  • SHA1

    5ff7082170d06e0244014d993a3a26f8dafbb00e

  • SHA256

    e07c09f57f06d41f1aa2a761a587e0a26bcde307422495ed075a82c5257086d6

  • SHA512

    5bde3ba9bd7b79cdba2450f1b48aa3991d86fcd672f8f03e1216eccdb703c62403465c1af47579bab86fc6ffec8790c8b910c6c41563b62a7bfcd4914150ef23

  • SSDEEP

    384:w/8oj/JkvrTx3TDODwx2pUMkSZfUxZqeFpym9sBbDsetSuhScqDCR2ll:FKmNDNMkGcxZRF93QhScqc2ll

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/861182160127918150/IeKGPUb8uRkJyZG3-A_U2CxLcPPUzrC0ck9yhlV2_vvu5pqPvyVmoHbHH0moBP3VhtWY

Targets

    • Target

      Blueness.exe

    • Size

      41KB

    • MD5

      b21ac4a352ff7497ceb505a2bcfa675b

    • SHA1

      b7f7c37e3698007d669996d55fe69816e40053a3

    • SHA256

      bef85bf8492824353c84665db8cbadf6d778e9105a580bb7dd0cf9137578c422

    • SHA512

      80f3418c05aeea581fddc0636846141841605352aeac000dd94190632b86b99c9a537a8aac74e27c417ecd11a3f9a628b4ecfd39f0c6994b527c6e8b34457159

    • SSDEEP

      384:yAaUZDRC2PZeXg25upQ1X+P2eYevLpCIb2uEy5y8Tcjs/XZxIh/0gJEFq5nmXQsU:NgPzetQIxo8CuZ0LaTCKZKfgm3Ehbr

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks