General

  • Target

    Xeno-v1.1.35-x64.zip

  • Size

    32KB

  • Sample

    250129-axgymsylgm

  • MD5

    6a28cd3be33586c3dcb2ac169003c548

  • SHA1

    2277437eaaee8d0815000476c8521cf73c4d7b2d

  • SHA256

    66ade287222cf2a4e9e71004621df90f588deac45c3dce68f8503cba9bdf8312

  • SHA512

    c68527162b4f5174c36efb264a05cde04550707eed98d1dd16c7f8f20143475c6321f8db3b6cb9feafe357ed405ef6ba49d6b1f8616d03c404300c88d7a793be

  • SSDEEP

    768:IPthRD6YRXzvK44CX4Va0fWPXsX9lrjiXYl66Bl3QB:IPxOYRXzodV+PyBKM623c

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1333893784458494094/VsXf64MEiiSt3WDbJfN18xkRlK1PMa25-mHBLhIAisvV_VxqhXkqWyNqnIvqYoFDLSu0

Targets

    • Target

      Xeno-v1.1.35-x64/XenoV1.1.35.exe

    • Size

      68KB

    • MD5

      891b44dff823ec8ce1af4e3a2b346ffe

    • SHA1

      f0c1b6380519bc5cdd9078bebd5a4ff9e488d95f

    • SHA256

      11861df8624b22cc941879ccc11624af0e1406b97d5f7bd45e4571858ca65d2b

    • SHA512

      df537e1a18bb0306ccbb28ff2722718d3369b0b6d81cea76a52eceeb4e498ff9ca308eec7a2fbd78ef51a5ec27e77a06207bddadddcd71ce7352c2fb1a568701

    • SSDEEP

      768:kYV4lMmcgmpQuZZLwjTjRKZKfgm3EhIQyrf3XZOfdXc3AgqALMe5F6Oua:fAWp/LwjTVF7EmQwXZQ3gqAoGua

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks