General
-
Target
9e6ef48f9c3db5f422aa5d8f4be7817c8a3e0c065bd59150dc1dd2fb9e2029a6
-
Size
479KB
-
Sample
240417-qg1zksad9x
-
MD5
e5062068ac159938a36fd5c812b80b2a
-
SHA1
1e2213bd8cd5bcab269485c2bc6c2977d075fd5c
-
SHA256
9e6ef48f9c3db5f422aa5d8f4be7817c8a3e0c065bd59150dc1dd2fb9e2029a6
-
SHA512
29ab8b40effc585dfcff7848fdcf342a4e4abb88156e5f9d168cb86445bef085620e9727a50829c15b4b861db706a7957e88eab31feee8004021c17c3f5028e6
-
SSDEEP
12288:UGERRoBn/ZLtNkafT9as84r72f8q+V/LEbVU0YiPoyUUh:sToB/Z3pSM2f8dLEbVU0Y49bh
Static task
static1
Behavioral task
behavioral1
Sample
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
-
Size
523KB
-
MD5
dcee3487134de31384cc480650d0b872
-
SHA1
728aac232b591c08d2a0a727a5024afdb17f3b56
-
SHA256
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9
-
SHA512
dd0751578f48b5a2e6931c31865c235f464fb3d6fe4bdbd8389ab9d8429b0ffb69205773b276dc930ab1dc672fe7ed724559bdb4a1896ba26bc9cd3b74570399
-
SSDEEP
12288:4Mr8y900yOk63JeBswLMA9Kyzr7Hx/XupZF7:UyMx0eB0Ryzr7Hx/XupZF7
Score10/10-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1