General
-
Target
fN3Rw90.exe
-
Size
656KB
-
Sample
231113-llejxsbh41
-
MD5
df3f39c942566630fed40b908de1f3e5
-
SHA1
55eca8df1d2a23689ce1c767094a189fcbf125bc
-
SHA256
9834a943ec66994fde72fab0661bf6b22356d301ec7e4aae805d7fcb16e3728f
-
SHA512
ce8291fca3f3ca34798f4d97f0f5015d20dd056ae230608bd80f8bd45fe117e35b3a4cf951a371c2a9ccd8d838a6ac311aefc864fc5f8cf22bd0351bf4dc01cd
-
SSDEEP
12288:oMrky90T0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6A2pXbJvY0m:syAiaaewIsgCQGIgYDrVvxm
Static task
static1
Behavioral task
behavioral1
Sample
fN3Rw90.exe
Resource
win7-20231020-en
Malware Config
Extracted
mystic
http://5.42.92.43/loghub/master
Targets
-
-
Target
fN3Rw90.exe
-
Size
656KB
-
MD5
df3f39c942566630fed40b908de1f3e5
-
SHA1
55eca8df1d2a23689ce1c767094a189fcbf125bc
-
SHA256
9834a943ec66994fde72fab0661bf6b22356d301ec7e4aae805d7fcb16e3728f
-
SHA512
ce8291fca3f3ca34798f4d97f0f5015d20dd056ae230608bd80f8bd45fe117e35b3a4cf951a371c2a9ccd8d838a6ac311aefc864fc5f8cf22bd0351bf4dc01cd
-
SSDEEP
12288:oMrky90T0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6A2pXbJvY0m:syAiaaewIsgCQGIgYDrVvxm
-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-