General

  • Target

    Skript.gg-main.zip

  • Size

    24KB

  • Sample

    241231-x9xk7avrez

  • MD5

    123ed8ad2658c6282765fc1bae1957fe

  • SHA1

    ebe2f2f2cad96e4591822433f7394af06e334095

  • SHA256

    d0b45b8af961ae83e2d6941e010d5adb6f86bec447682a3ab32bd84074155f2e

  • SHA512

    689bc053a668e8ececce89d14b4ffe6c9b203e95a92385fd3615b465a687b3dd414543315178bae555b0e71797058c1f39a7e97ddf27e5aa527737137b0ba665

  • SSDEEP

    384:cPtjij4a6Gw/T9Ls2rtjvqHzqYqlkpDmvXYhQ1zHZoBUeeRrw5/KDAj:cPczw/BLSzqTQDmvXYhIzHm6GiA

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1014925257104162816/i_FgV0Vzo9Zj1gKs2wPCtFL9nQzLwfkh1frAZ_EO2HgDoESbbCIxJZtcdGID1SDoDkRZ

Targets

    • Target

      Skript.gg-main/S0.KvRIxPT.exe

    • Size

      42KB

    • MD5

      858cbb9092153a7097a7da5e4a2195f9

    • SHA1

      4cf6fe6d834168e18430ff8632265fd93e8c9bcf

    • SHA256

      a74dac946b8d97e1d4e193d64aac8781eb32039412037a195aa10b40a19dc441

    • SHA512

      1d5795d7931b02c7cc7d17b81d52bce17da85dd03d81ac5221b8eccda0bda0fe9052925037ea44cd64a4c3fce5ab648dc2f17f784f8261ed90f10c32b1f9a02b

    • SSDEEP

      768:XgtO5EYH//4MmuZqLHSTjCKZKfgm3Ehhx:JEaDyLHSTWF7Erx

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks