General

  • Target

    blazed_woofer.exe

  • Size

    91KB

  • Sample

    240515-3l2g5aac54

  • MD5

    2acc21dd0e5cd32a4a4b18788c2f2987

  • SHA1

    c0ca0fb07c6dd87b79d285c2446435cd20cad849

  • SHA256

    b5b783a542d49a00d941dfd70cecd52b78f11aa930e7cd56c62a5fb736879866

  • SHA512

    5baa6de8d39407f3f0480866b01b66d90a98581ee5f74bf0b618d294eb80559ab64213436b2aeaa54ddcbe17146100f9074bf4950f07e45b678f1a6ab2d011f8

  • SSDEEP

    768:6CKR5YzOfnuZwL7gCTj/KZKfgm3EhQpkTzNcGSY0j0eXAt:mYzOftL7gCTTF7E+pCF

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1240445904775807058/6_g5rqN3CsnDQO5XS8yerOBz9aGjobHi-z9J_tvi6O0Ve-0skG3YKLemRBTJDRwZopVq

Targets

    • Target

      blazed_woofer.exe

    • Size

      91KB

    • MD5

      2acc21dd0e5cd32a4a4b18788c2f2987

    • SHA1

      c0ca0fb07c6dd87b79d285c2446435cd20cad849

    • SHA256

      b5b783a542d49a00d941dfd70cecd52b78f11aa930e7cd56c62a5fb736879866

    • SHA512

      5baa6de8d39407f3f0480866b01b66d90a98581ee5f74bf0b618d294eb80559ab64213436b2aeaa54ddcbe17146100f9074bf4950f07e45b678f1a6ab2d011f8

    • SSDEEP

      768:6CKR5YzOfnuZwL7gCTj/KZKfgm3EhQpkTzNcGSY0j0eXAt:mYzOftL7gCTTF7E+pCF

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks