General
-
Target
ALG_.exe
-
Size
41KB
-
Sample
250324-w1wf4axmy8
-
MD5
46fd49191202386317facb5ac2157e2e
-
SHA1
5a52d8e40e4602eead1cd84cf8e4a718bdf020e7
-
SHA256
e3daf5a3dd5e01ab6f5ed2f7ac60fa80fc39f001b35d8345544109582b255e99
-
SHA512
b121307ed2d5c395bf3181fc7e9fe2fdb7b853fc1abb72dbe83d3be4f352aff85ef43df6bcfa4e2908b20bd4293a34682b3481c5950aad69b0799a3e7ddce563
-
SSDEEP
768:8scaIyIde8bH5M/BgwwuZaefWTjtKZKfgm3Eh2H:Tc1He862efWTJF7EoH
Behavioral task
behavioral1
Sample
ALG_.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ALG_.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1353428582617317427/6wfKFgsJQtu_LlNQm9f91lBzKCAbcj8s7GDl_5m_ej1_pdgZF56aGaBolzWErmqIoq1X
Targets
-
-
Target
ALG_.exe
-
Size
41KB
-
MD5
46fd49191202386317facb5ac2157e2e
-
SHA1
5a52d8e40e4602eead1cd84cf8e4a718bdf020e7
-
SHA256
e3daf5a3dd5e01ab6f5ed2f7ac60fa80fc39f001b35d8345544109582b255e99
-
SHA512
b121307ed2d5c395bf3181fc7e9fe2fdb7b853fc1abb72dbe83d3be4f352aff85ef43df6bcfa4e2908b20bd4293a34682b3481c5950aad69b0799a3e7ddce563
-
SSDEEP
768:8scaIyIde8bH5M/BgwwuZaefWTjtKZKfgm3Eh2H:Tc1He862efWTJF7EoH
Score10/10-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1