General
-
Target
bc3b8e119b26c24c0f00ef40c84d79b0dd7a96ee6c0e98c7cd3c546cc8b9ef5eN
-
Size
344KB
-
Sample
240926-2kk83s1gkm
-
MD5
2ada42c367d55fb0114b4083ade1e3b0
-
SHA1
547f1af927b7b552cea4d1772f03a76c8e7ba085
-
SHA256
bc3b8e119b26c24c0f00ef40c84d79b0dd7a96ee6c0e98c7cd3c546cc8b9ef5e
-
SHA512
2f6f4ed12605f008ffb9cae6c2dfa6527953701a3a2ea82b05f5f45d2725babd437e434b47deb84b4181340a094967a84ceedb209ff2b5da9c08ddcbfb1b43c2
-
SSDEEP
6144:KXy+bnr+Xp0yN90QEjiaS6lz6vi0U4n1KyYIds6uUjs/:JMrby90hJSUz70lnkyYB6ul
Static task
static1
Malware Config
Targets
-
-
Target
bc3b8e119b26c24c0f00ef40c84d79b0dd7a96ee6c0e98c7cd3c546cc8b9ef5eN
-
Size
344KB
-
MD5
2ada42c367d55fb0114b4083ade1e3b0
-
SHA1
547f1af927b7b552cea4d1772f03a76c8e7ba085
-
SHA256
bc3b8e119b26c24c0f00ef40c84d79b0dd7a96ee6c0e98c7cd3c546cc8b9ef5e
-
SHA512
2f6f4ed12605f008ffb9cae6c2dfa6527953701a3a2ea82b05f5f45d2725babd437e434b47deb84b4181340a094967a84ceedb209ff2b5da9c08ddcbfb1b43c2
-
SSDEEP
6144:KXy+bnr+Xp0yN90QEjiaS6lz6vi0U4n1KyYIds6uUjs/:JMrby90hJSUz70lnkyYB6ul
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1