Analysis
-
max time kernel
32s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 08:20
Behavioral task
behavioral1
Sample
PLigma32_ProjectLigmaV2.0.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PLigma32_ProjectLigmaV2.0.0.exe
Resource
win10v2004-20250207-en
General
-
Target
PLigma32_ProjectLigmaV2.0.0.exe
-
Size
217KB
-
MD5
6f01ea85513ed933da12cce31ccb9f3c
-
SHA1
ee7e8adbfd9563cf71b654834756e3117890dff6
-
SHA256
618dda19d824d906de30767c1332b45bd945e83a8dc34f32f74664cb7fba4948
-
SHA512
f440f4fe4c02447d4c292524fc67debb09faf01146408b77eb84833312e0ee3125c55b45cc23e3b0b6ca300de0c2fe31a809004767e9aed6e2c41c91187ccd4d
-
SSDEEP
3072:VrcRLkTCF7E0l3+fqZBI3Ib70yTuZxf3u4CTadMmO8YC+uxFNV9tf6T67NJr0N:eRj5m3IkyTAl3ut2dljB+uxr/t6OPY
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1297265064231043205/XDHM7OLDiEUDyMSpEP52XAoWoKDKd3t7MNGzJiC2bpD_qwj3W3pzZgwHIT-aArktzD8U
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 discord.com 9 discord.com 10 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 6 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PLigma32_ProjectLigmaV2.0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PLigma32_ProjectLigmaV2.0.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 PLigma32_ProjectLigmaV2.0.0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2116 2236 PLigma32_ProjectLigmaV2.0.0.exe 31 PID 2236 wrote to memory of 2116 2236 PLigma32_ProjectLigmaV2.0.0.exe 31 PID 2236 wrote to memory of 2116 2236 PLigma32_ProjectLigmaV2.0.0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\PLigma32_ProjectLigmaV2.0.0.exe"C:\Users\Admin\AppData\Local\Temp\PLigma32_ProjectLigmaV2.0.0.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2236 -s 14282⤵PID:2116
-