General
-
Target
SecuriteInfo.com.W32.MSIL_Kryptik.IYD.gen.Eldorado.20371.19827.exe
-
Size
724KB
-
Sample
240126-q2d1jsehh8
-
MD5
fb3a881fa28d196bcbd22d534e772bd0
-
SHA1
1aa77a83c10996d031532ec60a710d718cacb3e2
-
SHA256
dd00caf5d7f9bf6c5286c276edcbf1ab721a439345867a1b42a318b923c34314
-
SHA512
4f72a7b930f69dbf9ca0f19d1be1db9f3bba1e48197b79ab9bee01c67ca2bc2b7712956f8ae5d6e72cd147dde897cac6e17d8ffb971462806a4d7a6682b7c003
-
SSDEEP
12288:Y89ujjU3YRggy3cMnjNB10XZBzoTrgeJbKvcDkJntVOb6dNTPRtSK1SuXfKmsDW2:Y8AjjJRFys4NH03cTEeokDkJntVO4T
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.MSIL_Kryptik.IYD.gen.Eldorado.20371.19827.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.MSIL_Kryptik.IYD.gen.Eldorado.20371.19827.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.coperwire.com - Port:
587 - Username:
[email protected] - Password:
ogadiMMA1! - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.W32.MSIL_Kryptik.IYD.gen.Eldorado.20371.19827.exe
-
Size
724KB
-
MD5
fb3a881fa28d196bcbd22d534e772bd0
-
SHA1
1aa77a83c10996d031532ec60a710d718cacb3e2
-
SHA256
dd00caf5d7f9bf6c5286c276edcbf1ab721a439345867a1b42a318b923c34314
-
SHA512
4f72a7b930f69dbf9ca0f19d1be1db9f3bba1e48197b79ab9bee01c67ca2bc2b7712956f8ae5d6e72cd147dde897cac6e17d8ffb971462806a4d7a6682b7c003
-
SSDEEP
12288:Y89ujjU3YRggy3cMnjNB10XZBzoTrgeJbKvcDkJntVOb6dNTPRtSK1SuXfKmsDW2:Y8AjjJRFys4NH03cTEeokDkJntVO4T
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-