General
-
Target
JaffaCakes118_409eed418408597f0a962a72084954fc
-
Size
302KB
-
Sample
250101-apztgsxkhs
-
MD5
409eed418408597f0a962a72084954fc
-
SHA1
138afac3a26afe9ae80c2f4039aa37b683c720a4
-
SHA256
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651
-
SHA512
483cf76c9c59d024491c68bb8678676060e1b375e4b3264aad4a88ef85bb5a300e4210d56d0a3e7677dbf19d101e72b9fd11c8f9a4a91d04234b8fd023eda8a8
-
SSDEEP
6144:vRCiEKbuoRwE5WTrKi4LnqYkmIRZr/sBrD/jk9jtqpa7xjLazT:dbuoF5ErKNqKIt/0bk9jt4aFw
Behavioral task
behavioral1
Sample
JaffaCakes118_409eed418408597f0a962a72084954fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_409eed418408597f0a962a72084954fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/899039214799302707/qsWKqfMDHZvpjKdUaLOScVIgdq1amrTWt3H7cYjN7JYAUUvivw72drT90nFEQohSqE7a
Targets
-
-
Target
JaffaCakes118_409eed418408597f0a962a72084954fc
-
Size
302KB
-
MD5
409eed418408597f0a962a72084954fc
-
SHA1
138afac3a26afe9ae80c2f4039aa37b683c720a4
-
SHA256
1b8fb7ba5b8df9b78b495cd8bf6dcfa9f2c2788ca14db5f0a8c6f764477e8651
-
SHA512
483cf76c9c59d024491c68bb8678676060e1b375e4b3264aad4a88ef85bb5a300e4210d56d0a3e7677dbf19d101e72b9fd11c8f9a4a91d04234b8fd023eda8a8
-
SSDEEP
6144:vRCiEKbuoRwE5WTrKi4LnqYkmIRZr/sBrD/jk9jtqpa7xjLazT:dbuoF5ErKNqKIt/0bk9jt4aFw
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1