General

  • Target

    BigStorage.exe

  • Size

    54KB

  • Sample

    250331-vtm1pswq18

  • MD5

    e4c2d116ff8f8602d7ca81f025036d5e

  • SHA1

    94b46e5379e1314ee96ffbaa48593ef326a9a1d4

  • SHA256

    1bd799f8311e4ed91a9e07a2d0ab1f0dfb737b2bf781dd15f854a324e837558f

  • SHA512

    92564e49328e9e282b18487f1cdf25a6d0badfe981fd02f88f4692f1a8eddd9899de9bae8faf18936e8513338a4aa4e738cb853722678a42246536ae8daf8fe3

  • SSDEEP

    768:pscaIyIJVENs/ywjuZeeJWTjOKZKfgm3EhHpUgzkrZEhJJtkAZPmE3OR:2c1TVEgreJWTaF7EFpUmNvzPF

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1356312400638247114/GvA4p92IQSQKZMWJi3SXvoE1endRZG65DVGTN3juCh_-euq8AYz3K3YVPjOQLjStWmTI

Targets

    • Target

      BigStorage.exe

    • Size

      54KB

    • MD5

      e4c2d116ff8f8602d7ca81f025036d5e

    • SHA1

      94b46e5379e1314ee96ffbaa48593ef326a9a1d4

    • SHA256

      1bd799f8311e4ed91a9e07a2d0ab1f0dfb737b2bf781dd15f854a324e837558f

    • SHA512

      92564e49328e9e282b18487f1cdf25a6d0badfe981fd02f88f4692f1a8eddd9899de9bae8faf18936e8513338a4aa4e738cb853722678a42246536ae8daf8fe3

    • SSDEEP

      768:pscaIyIJVENs/ywjuZeeJWTjOKZKfgm3EhHpUgzkrZEhJJtkAZPmE3OR:2c1TVEgreJWTaF7EFpUmNvzPF

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks