General

  • Target

    9f39517e902a817dd6a544849dca7683ed86df3baef00cb5e82cfd831e1306b7.zip

  • Size

    18KB

  • Sample

    250326-1rl9aawjw3

  • MD5

    bc74ebc94e03e70581abbaf8283ec1e1

  • SHA1

    f37f11520757a917643dc175099b9ad5c6c64cbc

  • SHA256

    9f39517e902a817dd6a544849dca7683ed86df3baef00cb5e82cfd831e1306b7

  • SHA512

    189882b7c5b5ce96d9c9c3ae57840d0f152a728bc6949ccbd368f426c767b58ca68cea66d0124fd321305d0227afd521bbd03bd25775456fde12f12be6474db8

  • SSDEEP

    384:91a3kS9O6tVF6yMlG7pbbeSo8LPz/2j2o84ooncJwJHUVD:MkOtayMYMSogqxx8

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/877387515915538482/COUuJ4RVtk2AutSpdNUBoKBQXvppkXWytekfOGO0pD83Fk9CfR7C50_wiRdirV9wIUlL

Targets

    • Target

      a14918133b9b818fa2e8728faa075c4f173fa69abc424f39621d6aa1405f5a18.exe

    • Size

      42KB

    • MD5

      b0f913683283828cc3f5ba3e05d2db87

    • SHA1

      9936076d26746065ce3edd965917dd759d140ae6

    • SHA256

      a14918133b9b818fa2e8728faa075c4f173fa69abc424f39621d6aa1405f5a18

    • SHA512

      f73d2f98527c27241c6f6984f3f05626e8b58290d03c9b07708b1476b16e5ee8794d4f6cc7dfaed1186d35e481d74befb888fe230cab1e6535ecc6177636e91d

    • SSDEEP

      768:7eJ7z84lMmDKmpMuZVLjfTjtKZKfgm3Eh99:hAFpDLjfTxF7EL9

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks