General
-
Target
Jq3QO20.exe
-
Size
656KB
-
Sample
231113-lgwyeabh2s
-
MD5
07305c9be8c5b783b988a088ae04b78b
-
SHA1
20fbf7549a5f25104e6978686a02893f047a7cad
-
SHA256
bc6f0aeb3a9a512252787af9df31838f9d402b8c4c6341555495d222d0d0ce58
-
SHA512
9043cfd3f05e2d21b81298c1246ad470c01b01b130c64d0f30d59fbe87274b48dcf377e8a583f640c74e678cd3e4e704b7e33a1ae17d7d44022f20e1e28357b0
-
SSDEEP
12288:DMroy90D0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6SVh4+je6/Oct:DyQiaaewIsgCQGIgYDehpvt
Static task
static1
Behavioral task
behavioral1
Sample
Jq3QO20.exe
Resource
win7-20231025-en
Malware Config
Targets
-
-
Target
Jq3QO20.exe
-
Size
656KB
-
MD5
07305c9be8c5b783b988a088ae04b78b
-
SHA1
20fbf7549a5f25104e6978686a02893f047a7cad
-
SHA256
bc6f0aeb3a9a512252787af9df31838f9d402b8c4c6341555495d222d0d0ce58
-
SHA512
9043cfd3f05e2d21b81298c1246ad470c01b01b130c64d0f30d59fbe87274b48dcf377e8a583f640c74e678cd3e4e704b7e33a1ae17d7d44022f20e1e28357b0
-
SSDEEP
12288:DMroy90D0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6SVh4+je6/Oct:DyQiaaewIsgCQGIgYDehpvt
-
Detect Mystic stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-