Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    TOP FREE BYPASSER.exe

  • Size

    42KB

  • Sample

    250306-ngjzysxpv5

  • MD5

    59abe1cbdc7e17862d6ab75df5d8eaf2

  • SHA1

    ac58c202a279f3d175d2d35e9e4e605b1a2c0356

  • SHA256

    e625a902a9b9ef31d21a6ec5caba611cc60bfcae80732018822e69eaa49ae60e

  • SHA512

    7f1b4eef5850b13cf338fd0737c3aa4ba5f0501ce10639f2feb60c28eebedf7082dc12e3841d7737dbd9fc53636d37c91951a33fada06e2c0ea8dba40ee1eb3b

  • SSDEEP

    768:MlMY8YKcKIEomMMuZJLb5TjNKZKfgm3Eh+U:FLYKcbceLb5TJF7EYU

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1347141055732121690/e-EvRsMJVawTO-w1O-rDrN_E2vuW-Y_s69K_J4UvaiFv50l_kGqVgR7tbuyuStNVzMsz

Targets

    • Target

      TOP FREE BYPASSER.exe

    • Size

      42KB

    • MD5

      59abe1cbdc7e17862d6ab75df5d8eaf2

    • SHA1

      ac58c202a279f3d175d2d35e9e4e605b1a2c0356

    • SHA256

      e625a902a9b9ef31d21a6ec5caba611cc60bfcae80732018822e69eaa49ae60e

    • SHA512

      7f1b4eef5850b13cf338fd0737c3aa4ba5f0501ce10639f2feb60c28eebedf7082dc12e3841d7737dbd9fc53636d37c91951a33fada06e2c0ea8dba40ee1eb3b

    • SSDEEP

      768:MlMY8YKcKIEomMMuZJLb5TjNKZKfgm3Eh+U:FLYKcbceLb5TJF7EYU

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks