General

  • Target

    d.exe

  • Size

    30.1MB

  • Sample

    250202-t3xqtssjgr

  • MD5

    d28d1fb7e5f6e18fdf38056fedc4bcc7

  • SHA1

    cb1d4b3e4e07c24946a49e8f67a1a5f37d945d90

  • SHA256

    03401dc5183cfa15c4456d97e9bb8b6198582f8c878f0c1c7915087e5f589e12

  • SHA512

    12b551ff8ff52ae423abec99bad8b7ad0d72ae87e442d133185c42268fe6d7ea557d60e56ada72c77253b7a15de92c2b4f631dfbe1186ae91370da896c9b7973

  • SSDEEP

    393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgF96l+ZArYsFRlW:R3on1HvSzxAMNFFZArYsu

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1335634650365956146/ihJuSbngtg9dj6CoF36EDPJlqhYvOAflRsX6niXbGAHVQr-XlJX1mOVlotqoWPuGon4l

Targets

    • Target

      d.exe

    • Size

      30.1MB

    • MD5

      d28d1fb7e5f6e18fdf38056fedc4bcc7

    • SHA1

      cb1d4b3e4e07c24946a49e8f67a1a5f37d945d90

    • SHA256

      03401dc5183cfa15c4456d97e9bb8b6198582f8c878f0c1c7915087e5f589e12

    • SHA512

      12b551ff8ff52ae423abec99bad8b7ad0d72ae87e442d133185c42268fe6d7ea557d60e56ada72c77253b7a15de92c2b4f631dfbe1186ae91370da896c9b7973

    • SSDEEP

      393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgF96l+ZArYsFRlW:R3on1HvSzxAMNFFZArYsu

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks