General

  • Target

    SecuriteInfo.com.W32.MSIL_Kryptik.KZR.gen.Eldorado.14377.22773

  • Size

    930KB

  • Sample

    240523-kctrtaag6w

  • MD5

    5a9fb46b5034fd8af30f74735eeef49c

  • SHA1

    8cf680dd42e9e4e1649698573e3f17ab9919df8e

  • SHA256

    fc1ef39decb8a6c7b9ba61c4a4be9048d9e7ac29619e6704d7549f1524a3b6a3

  • SHA512

    bb20326cea0985e0001d922c6392a2e1b42fb14fdcab7fa890e91e9236bc53db84b82f8cad3988aad01453f306fce0f46e44e6ddab8252bee45468bddcc250f0

  • SSDEEP

    12288:tuZsuRLyfDp2XqM6KTzDTtRXKVXx/uLxojvG8rMUxkR:gZsg+fDp2XxZTrWcG+hUs

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SecuriteInfo.com.W32.MSIL_Kryptik.KZR.gen.Eldorado.14377.22773

    • Size

      930KB

    • MD5

      5a9fb46b5034fd8af30f74735eeef49c

    • SHA1

      8cf680dd42e9e4e1649698573e3f17ab9919df8e

    • SHA256

      fc1ef39decb8a6c7b9ba61c4a4be9048d9e7ac29619e6704d7549f1524a3b6a3

    • SHA512

      bb20326cea0985e0001d922c6392a2e1b42fb14fdcab7fa890e91e9236bc53db84b82f8cad3988aad01453f306fce0f46e44e6ddab8252bee45468bddcc250f0

    • SSDEEP

      12288:tuZsuRLyfDp2XqM6KTzDTtRXKVXx/uLxojvG8rMUxkR:gZsg+fDp2XxZTrWcG+hUs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks