Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    VortexNuker1.42.exe

  • Size

    279KB

  • Sample

    250319-3dznka1lt7

  • MD5

    207f8d8cc0950ff123508360f40d187d

  • SHA1

    be3e5514551c68ad5b45b641621fcfd71797da5c

  • SHA256

    2876fe40976ecb099dfa01f066afc303bf2031a812d3b150896523ded9a865a8

  • SHA512

    d807019a0f164c44c4bffbb72a84255412c7e588b161cc1acbb170d541ac3a6ca8243b29cf8aaded537d90de03e7b283070c242bdb6a59ee1126a29d3c3efc61

  • SSDEEP

    3072:PmWL9TbF7EdANMe6rtVn+V6WBvAYioEefM9HZ5n3jTZakMhg+M4aluJrp/6fHC:PmWUjDqzBvA9ve4bn3jNa0+MEJt/D

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1352056092800061442/3CzW1cCaNZTbI4VuvNwVmMh68Q--8Gdw0gWMKHle7Np63DV39kvHq5YBo3g8N66-juC8

Targets

    • Target

      VortexNuker1.42.exe

    • Size

      279KB

    • MD5

      207f8d8cc0950ff123508360f40d187d

    • SHA1

      be3e5514551c68ad5b45b641621fcfd71797da5c

    • SHA256

      2876fe40976ecb099dfa01f066afc303bf2031a812d3b150896523ded9a865a8

    • SHA512

      d807019a0f164c44c4bffbb72a84255412c7e588b161cc1acbb170d541ac3a6ca8243b29cf8aaded537d90de03e7b283070c242bdb6a59ee1126a29d3c3efc61

    • SSDEEP

      3072:PmWL9TbF7EdANMe6rtVn+V6WBvAYioEefM9HZ5n3jTZakMhg+M4aluJrp/6fHC:PmWUjDqzBvA9ve4bn3jNa0+MEJt/D

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks