General
-
Target
NEAS.4a2fdfd20ce3cfeb5ca72b44d36f1b70.exe
-
Size
674KB
-
Sample
231117-evjfxaeg83
-
MD5
4a2fdfd20ce3cfeb5ca72b44d36f1b70
-
SHA1
31b1839437fb1790d8229b894c6a17361a75693c
-
SHA256
66141c174459efc918da5a873fbba05b04479438ca923cb95fa58db5654da003
-
SHA512
f7ea629d200ac3a3432662d444ff1c60cbcda6bedae1d67595df152c8f78528823d2087a94184a87d0782ee1446546d7b17ba7e42da8dc4a4cef7bad9f09c26f
-
SSDEEP
12288:2MrKy90v0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6USBMxlGXZM3Nrk2k0Y:YyqiaaewIsgCQGIgYDrOlGXZX0Y
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4a2fdfd20ce3cfeb5ca72b44d36f1b70.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
NEAS.4a2fdfd20ce3cfeb5ca72b44d36f1b70.exe
-
Size
674KB
-
MD5
4a2fdfd20ce3cfeb5ca72b44d36f1b70
-
SHA1
31b1839437fb1790d8229b894c6a17361a75693c
-
SHA256
66141c174459efc918da5a873fbba05b04479438ca923cb95fa58db5654da003
-
SHA512
f7ea629d200ac3a3432662d444ff1c60cbcda6bedae1d67595df152c8f78528823d2087a94184a87d0782ee1446546d7b17ba7e42da8dc4a4cef7bad9f09c26f
-
SSDEEP
12288:2MrKy90v0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6USBMxlGXZM3Nrk2k0Y:YyqiaaewIsgCQGIgYDrOlGXZX0Y
Score10/10-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-