Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Mercurial-installer.exe

  • Size

    6.3MB

  • Sample

    250220-a6j5csvkx2

  • MD5

    8a93ceab7692801e240fa4d15b7d2d21

  • SHA1

    42f5f0da90294133543b85a966905f26e59fc2fe

  • SHA256

    e5d33a634d0afcca971c73278c7ebe95d7e34343487c52a7beb3480965ef5a3f

  • SHA512

    e35f4854148bec95dd787cf618e0c045d70b74141567f44b34cb26940ff3b08e30a92cf16d51ce78d7f917e0a4b5208e80d1fdb69127148e149c90c10c9c9cfd

  • SSDEEP

    196608:4iFAl6mMDfxMvSRNPZptyvMABDTtGV/1QHp44ecv9OHMC994T:4iFAl8jxMKRRiMABPtGV/1SzksCv

Malware Config

Targets

    • Target

      Mercurial-installer.exe

    • Size

      6.3MB

    • MD5

      8a93ceab7692801e240fa4d15b7d2d21

    • SHA1

      42f5f0da90294133543b85a966905f26e59fc2fe

    • SHA256

      e5d33a634d0afcca971c73278c7ebe95d7e34343487c52a7beb3480965ef5a3f

    • SHA512

      e35f4854148bec95dd787cf618e0c045d70b74141567f44b34cb26940ff3b08e30a92cf16d51ce78d7f917e0a4b5208e80d1fdb69127148e149c90c10c9c9cfd

    • SSDEEP

      196608:4iFAl6mMDfxMvSRNPZptyvMABDTtGV/1QHp44ecv9OHMC994T:4iFAl8jxMKRRiMABPtGV/1SzksCv

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks