Resubmissions

05/04/2025, 05:06

250405-frn3nazzdw 10

General

  • Target

    Mercurial.Grabber.v1.03.rar

  • Size

    94KB

  • Sample

    250405-frn3nazzdw

  • MD5

    0ec5027161e49223bfbfe40321592511

  • SHA1

    1ba9f950d283058f0b41b0ece5f3becff811fd9c

  • SHA256

    371edb664c31555dac5e695b0f7286115dd94b380c188948bde2f167f030a7d3

  • SHA512

    809b69857661727a2f26cb4c0921e29e012ebbc998b3fe7cc1b6b24d973b51b15cdcb512f38cf37ae220ff346ced85056fedac786db36707c59fea952953133e

  • SSDEEP

    1536:fKsbf1SvOpAtcQZrlImqPqEvSGkbJ4pBJXK/YnNnJbbeygbZuJi:ysjIvJcQZDaqjbuPJXK/cJbbyIi

Malware Config

Extracted

Family

mercurialgrabber

C2

https://ptb.discord.com/api/webhooks/895223301373300776/4LFPS81olSXc9Stl05N1nV_de5bp6BZLZwfYl5WydodJ9w8AtEOpBRJrAJDKDvxbtGHz

Targets

    • Target

      Mercurial.Grabber.v1.03.rar

    • Size

      94KB

    • MD5

      0ec5027161e49223bfbfe40321592511

    • SHA1

      1ba9f950d283058f0b41b0ece5f3becff811fd9c

    • SHA256

      371edb664c31555dac5e695b0f7286115dd94b380c188948bde2f167f030a7d3

    • SHA512

      809b69857661727a2f26cb4c0921e29e012ebbc998b3fe7cc1b6b24d973b51b15cdcb512f38cf37ae220ff346ced85056fedac786db36707c59fea952953133e

    • SSDEEP

      1536:fKsbf1SvOpAtcQZrlImqPqEvSGkbJ4pBJXK/YnNnJbbeygbZuJi:ysjIvJcQZDaqjbuPJXK/cJbbyIi

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks