General

  • Target

    fN3Rw90.exe

  • Size

    656KB

  • Sample

    231113-llejxsbh41

  • MD5

    df3f39c942566630fed40b908de1f3e5

  • SHA1

    55eca8df1d2a23689ce1c767094a189fcbf125bc

  • SHA256

    9834a943ec66994fde72fab0661bf6b22356d301ec7e4aae805d7fcb16e3728f

  • SHA512

    ce8291fca3f3ca34798f4d97f0f5015d20dd056ae230608bd80f8bd45fe117e35b3a4cf951a371c2a9ccd8d838a6ac311aefc864fc5f8cf22bd0351bf4dc01cd

  • SSDEEP

    12288:oMrky90T0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6A2pXbJvY0m:syAiaaewIsgCQGIgYDrVvxm

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.43/loghub/master

Targets

    • Target

      fN3Rw90.exe

    • Size

      656KB

    • MD5

      df3f39c942566630fed40b908de1f3e5

    • SHA1

      55eca8df1d2a23689ce1c767094a189fcbf125bc

    • SHA256

      9834a943ec66994fde72fab0661bf6b22356d301ec7e4aae805d7fcb16e3728f

    • SHA512

      ce8291fca3f3ca34798f4d97f0f5015d20dd056ae230608bd80f8bd45fe117e35b3a4cf951a371c2a9ccd8d838a6ac311aefc864fc5f8cf22bd0351bf4dc01cd

    • SSDEEP

      12288:oMrky90T0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6A2pXbJvY0m:syAiaaewIsgCQGIgYDrVvxm

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks