General
-
Target
to3Rz90.exe
-
Size
658KB
-
Sample
231113-lpzn9sbh71
-
MD5
dd93ecb2105d0cd428aba45ecc3e64d3
-
SHA1
2c25278b0291c03a0ee0ead072a866fe38c0e5aa
-
SHA256
8ca643d9b79b8b95979e7a9731930569fc8dcbe61fe18b6654366404754f2472
-
SHA512
05859a47573ff2c2b9b649843c1fa2c8cad9f08f1e9ba0f9c0e171dee6e62610a85c89b361ad51c8e6d57035409975268c710c99f0cadde2f633ef824fb51a37
-
SSDEEP
12288:RMrzy90J0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6pYCkHaEl:myCiaaewIsgCQGIgYDflkHas
Static task
static1
Behavioral task
behavioral1
Sample
to3Rz90.exe
Resource
win7-20231025-en
Malware Config
Targets
-
-
Target
to3Rz90.exe
-
Size
658KB
-
MD5
dd93ecb2105d0cd428aba45ecc3e64d3
-
SHA1
2c25278b0291c03a0ee0ead072a866fe38c0e5aa
-
SHA256
8ca643d9b79b8b95979e7a9731930569fc8dcbe61fe18b6654366404754f2472
-
SHA512
05859a47573ff2c2b9b649843c1fa2c8cad9f08f1e9ba0f9c0e171dee6e62610a85c89b361ad51c8e6d57035409975268c710c99f0cadde2f633ef824fb51a37
-
SSDEEP
12288:RMrzy90J0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6pYCkHaEl:myCiaaewIsgCQGIgYDflkHas
-
Detect Mystic stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-