General
-
Target
eaa5bc31c0595e067ec5d2de5b893a4548157c59407cea5d21115d222c085544
-
Size
479KB
-
Sample
240417-p8z1xsgd22
-
MD5
b4369cddb8e15cf6a80132c7b26b6d1a
-
SHA1
f849077efcdb3f47f963f422b96fa14308aba166
-
SHA256
eaa5bc31c0595e067ec5d2de5b893a4548157c59407cea5d21115d222c085544
-
SHA512
c1c5e9b8661856748b3e5861659ddff84e6420e27030a9c528a01d45b468a07400a3445caf5f8c809353eee70c75af7e66de5d5cdeb7ec97b30d5ed817bee643
-
SSDEEP
12288:AGinsaG4dIj1lOdotm0l2ZERpnMNVNcBiKNPV2nZSWNnOq:PinsaMlOvbZErMRsimPVa5nf
Static task
static1
Behavioral task
behavioral1
Sample
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
-
Size
523KB
-
MD5
dcee3487134de31384cc480650d0b872
-
SHA1
728aac232b591c08d2a0a727a5024afdb17f3b56
-
SHA256
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9
-
SHA512
dd0751578f48b5a2e6931c31865c235f464fb3d6fe4bdbd8389ab9d8429b0ffb69205773b276dc930ab1dc672fe7ed724559bdb4a1896ba26bc9cd3b74570399
-
SSDEEP
12288:4Mr8y900yOk63JeBswLMA9Kyzr7Hx/XupZF7:UyMx0eB0Ryzr7Hx/XupZF7
Score10/10-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1