General

  • Target

    bea2a9767a931a547ad3d32913c752b613117c6868728a2fd81a5ef268f05116.exe

  • Size

    42KB

  • Sample

    250108-pa6qta1pen

  • MD5

    7f4d45a0994b619ede5fc5a28357cf81

  • SHA1

    32c5782421a65f06b84715f24e93a6e60136c537

  • SHA256

    bea2a9767a931a547ad3d32913c752b613117c6868728a2fd81a5ef268f05116

  • SHA512

    abc02b2d6fadfe64804f175b4358dd251d94c279af7b3991e37f7535ddd66148d31702e1b27dc05d0e65ba9f30156085c1bea5d1b7528a10d001966393aca272

  • SSDEEP

    768:ZPSm4lMmcgmpxuZsLRqTjAKZKfgm3Eh1AH:5AWpvLRqT0F7E/AH

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1324237031412600885/jXaIg4ATTpSFG8ZigAQLqZW3xZHhnYwtWWXOJOJ8ax3avDT0yUes6EI7UXDkcRKIQn7r

Targets

    • Target

      bea2a9767a931a547ad3d32913c752b613117c6868728a2fd81a5ef268f05116.exe

    • Size

      42KB

    • MD5

      7f4d45a0994b619ede5fc5a28357cf81

    • SHA1

      32c5782421a65f06b84715f24e93a6e60136c537

    • SHA256

      bea2a9767a931a547ad3d32913c752b613117c6868728a2fd81a5ef268f05116

    • SHA512

      abc02b2d6fadfe64804f175b4358dd251d94c279af7b3991e37f7535ddd66148d31702e1b27dc05d0e65ba9f30156085c1bea5d1b7528a10d001966393aca272

    • SSDEEP

      768:ZPSm4lMmcgmpxuZsLRqTjAKZKfgm3Eh1AH:5AWpvLRqT0F7E/AH

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks