Overview
overview
7Static
static
3BinLaden M...or.exe
windows7-x64
1BinLaden M...or.exe
windows10-2004-x64
1FastColore...ox.dll
windows7-x64
1FastColore...ox.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1functionHook.exe
windows7-x64
7functionHook.exe
windows10-2004-x64
7General
-
Target
Mystic_Executor (2).rar
-
Size
62.2MB
-
Sample
240620-2g2rnazhnc
-
MD5
ea2f736bd3ab3e27ae9a5b9736a11b70
-
SHA1
d87bd201d5cdf06f6ecf7f2b804a406cf45549f8
-
SHA256
d12706fdc21cc2efacf766d6df5b5f6bf0010d066bb0b87df926fe00f73bd502
-
SHA512
f55dc5d794924570e7e16d638eb3cf6135d90a86f3dcc92b7689bb97ce62cb5885f7133ba04b15b8d6cb6f8f8130e8d6142cd55fbc2858049e88f137d8764e7b
-
SSDEEP
1572864:DFDkD15GxeZ2PWRCbBYg3nyXkui90r3q/Gw3OOFbuj:pDkyvPWpeijU0bq4lj
Behavioral task
behavioral1
Sample
BinLaden Mystic Executor.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
BinLaden Mystic Executor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
FastColoredTextBox.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
FastColoredTextBox.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Newtonsoft.Json.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
functionHook.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
functionHook.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
BinLaden Mystic Executor.exe
-
Size
345KB
-
MD5
e13895a713b8ee1b5db9eee4f4bcd05a
-
SHA1
26613237d200f8b8c1d96929f0f6888e71254e03
-
SHA256
892bec756585b5e5a5b2a7747d5b7959d9c7f758a641515d06e27539d43533f3
-
SHA512
e5c8498709db79cadc75c5ca40577036dd7dac3665bcaa8feaf51ac3601e3b200d469b4ce68da493dfd8ed7c2207f156830ba947961f9656cff4912b75b1af3f
-
SSDEEP
6144:uoEcTM2ChCCPCCOCChCuCCa+CCCCCFUCrCCSCyrCCAj8JLM2ChCCPCCOCChCuCCV:uoEcTMH+JLMH+J
Score1/10 -
-
-
Target
FastColoredTextBox.dll
-
Size
323KB
-
MD5
8610f4d3cdc6cc50022feddced9fdaeb
-
SHA1
4b60b87fd696b02d7fce38325c7adfc9e806f650
-
SHA256
ac926c92ccfc3789a5ae571cc4415eb1897d500a79604d8495241c19acdf01b9
-
SHA512
693d1af1f89470eab659b4747fe344836affa0af8485b0c0635e2519815e5a498f4618ea08db9dcf421aac1069a04616046207ee05b9ed66c0a1c4a8f0bddd09
-
SSDEEP
6144:0R0J4lx4/7BA4xvNdcwCOg04j0y5mwZkdmsqmLDi5eNH+Dl1SIP0:0R0J48lAovNd7CO34D4b4eNO
Score1/10 -
-
-
Target
Newtonsoft.Json.dll
-
Size
695KB
-
MD5
195ffb7167db3219b217c4fd439eedd6
-
SHA1
1e76e6099570ede620b76ed47cf8d03a936d49f8
-
SHA256
e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
-
SHA512
56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
SSDEEP
12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
Score1/10 -
-
-
Target
functionHook.exe
-
Size
62.1MB
-
MD5
5cc81400ac36bdea6ca9e7fe3032358d
-
SHA1
e4ee9e7e65ea3ee445e8665d54b00474806118d8
-
SHA256
9dd548c2888ff143ad1e4552fb9c6b3183207b7e17ab81986c17b74751e40335
-
SHA512
865bf1aa8dbd1ea47dd86928a1a57a0ed318ed0de2daf15f88e68d91767db8edd6049449454010ba8719fa5051e8484490e64993decce4c5d74e1d6dc446622f
-
SSDEEP
1572864:XymQEeMAhRnOPrONJ0ul4zdxE77PRQvqRWUBjdnaO:XymgMAhBOyculC62qRdlda
Score7/10-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-