General
-
Target
SecuriteInfo.com.W32.MSIL_Kryptik.KZR.gen.Eldorado.14377.22773
-
Size
930KB
-
Sample
240523-kctrtaag6w
-
MD5
5a9fb46b5034fd8af30f74735eeef49c
-
SHA1
8cf680dd42e9e4e1649698573e3f17ab9919df8e
-
SHA256
fc1ef39decb8a6c7b9ba61c4a4be9048d9e7ac29619e6704d7549f1524a3b6a3
-
SHA512
bb20326cea0985e0001d922c6392a2e1b42fb14fdcab7fa890e91e9236bc53db84b82f8cad3988aad01453f306fce0f46e44e6ddab8252bee45468bddcc250f0
-
SSDEEP
12288:tuZsuRLyfDp2XqM6KTzDTtRXKVXx/uLxojvG8rMUxkR:gZsg+fDp2XxZTrWcG+hUs
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.MSIL_Kryptik.KZR.gen.Eldorado.14377.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.valeofarma.it - Port:
587 - Username:
[email protected] - Password:
valeofarmavero - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.W32.MSIL_Kryptik.KZR.gen.Eldorado.14377.22773
-
Size
930KB
-
MD5
5a9fb46b5034fd8af30f74735eeef49c
-
SHA1
8cf680dd42e9e4e1649698573e3f17ab9919df8e
-
SHA256
fc1ef39decb8a6c7b9ba61c4a4be9048d9e7ac29619e6704d7549f1524a3b6a3
-
SHA512
bb20326cea0985e0001d922c6392a2e1b42fb14fdcab7fa890e91e9236bc53db84b82f8cad3988aad01453f306fce0f46e44e6ddab8252bee45468bddcc250f0
-
SSDEEP
12288:tuZsuRLyfDp2XqM6KTzDTtRXKVXx/uLxojvG8rMUxkR:gZsg+fDp2XxZTrWcG+hUs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-