General
-
Target
SecuriteInfo.com.Variant.Lazy.405958.21084.18767.exe
-
Size
728KB
-
Sample
231121-sp6k5sga4x
-
MD5
54f5a88e40b41b5d088d6dda06295b4e
-
SHA1
ac93c88fd247fa7e5b9fadf1a89da8340722f1ec
-
SHA256
937c24c7bc8f644e736aeff6cbd1215b0092f22b786ae9bff4c04df71f7b637a
-
SHA512
7b1fd7f02825cd1ea02ae8eba17faafea88e987e281c5995c123be4aa9e7a375841341b27443749aac8a1edd56ce7814e0eac73c3204a502b42bbaeb25dd9cdc
-
SSDEEP
12288:+0B83HMvElpIYHQUtGGWs888888888888W88888888888qz36f9b6daPOytpSn:PqHCElpIYHQUtGGWdU9b6d0t
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Lazy.405958.21084.18767.exe
Resource
win7-20231025-en
Malware Config
Extracted
mystic
http://5.42.64.20/loghub/master
Targets
-
-
Target
SecuriteInfo.com.Variant.Lazy.405958.21084.18767.exe
-
Size
728KB
-
MD5
54f5a88e40b41b5d088d6dda06295b4e
-
SHA1
ac93c88fd247fa7e5b9fadf1a89da8340722f1ec
-
SHA256
937c24c7bc8f644e736aeff6cbd1215b0092f22b786ae9bff4c04df71f7b637a
-
SHA512
7b1fd7f02825cd1ea02ae8eba17faafea88e987e281c5995c123be4aa9e7a375841341b27443749aac8a1edd56ce7814e0eac73c3204a502b42bbaeb25dd9cdc
-
SSDEEP
12288:+0B83HMvElpIYHQUtGGWs888888888888W88888888888qz36f9b6daPOytpSn:PqHCElpIYHQUtGGWdU9b6d0t
-
Detect Mystic stealer payload
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-