General
-
Target
JaffaCakes118_037ce49f267667b679cbf2fb94001f28
-
Size
4.0MB
-
Sample
250106-alvqcszmaz
-
MD5
037ce49f267667b679cbf2fb94001f28
-
SHA1
b3f0b51f189a62f04817b37d428e8aef9f6b8e7e
-
SHA256
9d37032e823df7f4a195dfbee978c3a9657dd9e658d6a1708922b3ba8e04675b
-
SHA512
35779c857861dfc2cfcc57016a8cc1d60caf90eae31f3ab0cece943243eca983a13a8238375cbad499eceb395e841e8047330700775c592a3bee348d16a05160
-
SSDEEP
49152:NExtvMTqVBGxMQg3Q3cX5C/wnvdAlPjcmYl0XzrT:A0TqnAX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_037ce49f267667b679cbf2fb94001f28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_037ce49f267667b679cbf2fb94001f28.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/874761712887300207/BmuphDWQjfFNAYHKgDrSKEZfCgrbPOvKYqgTtH0j7Fq8wKrMzpEHuiIW7H_YPhGUC74t
Targets
-
-
Target
JaffaCakes118_037ce49f267667b679cbf2fb94001f28
-
Size
4.0MB
-
MD5
037ce49f267667b679cbf2fb94001f28
-
SHA1
b3f0b51f189a62f04817b37d428e8aef9f6b8e7e
-
SHA256
9d37032e823df7f4a195dfbee978c3a9657dd9e658d6a1708922b3ba8e04675b
-
SHA512
35779c857861dfc2cfcc57016a8cc1d60caf90eae31f3ab0cece943243eca983a13a8238375cbad499eceb395e841e8047330700775c592a3bee348d16a05160
-
SSDEEP
49152:NExtvMTqVBGxMQg3Q3cX5C/wnvdAlPjcmYl0XzrT:A0TqnAX
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1