General
-
Target
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16483.31457.exe
-
Size
1.1MB
-
Sample
240612-rrv2rasapq
-
MD5
1955eb58994139f76ff3ac25eef4a717
-
SHA1
adaea6ee8e98253f79ee23a6d6e7154d0a44732b
-
SHA256
31ea4b3caac19e152570c72004d306c5121748aeba67244e6233df2313f16118
-
SHA512
422af38dbda97222f0a6616a294d51a1fbcf8aa3012e02ffac1a830383a30a467566856131b8f36596ef0435e3bfa7e2e5e75188582e277280fcde25dda0d6c9
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHaGmqfYtsvxf5:sh+ZkldoPK8YaGFfSk
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16483.31457.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16483.31457.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sklada.bg - Port:
587 - Username:
[email protected] - Password:
Kaloyan10 - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16483.31457.exe
-
Size
1.1MB
-
MD5
1955eb58994139f76ff3ac25eef4a717
-
SHA1
adaea6ee8e98253f79ee23a6d6e7154d0a44732b
-
SHA256
31ea4b3caac19e152570c72004d306c5121748aeba67244e6233df2313f16118
-
SHA512
422af38dbda97222f0a6616a294d51a1fbcf8aa3012e02ffac1a830383a30a467566856131b8f36596ef0435e3bfa7e2e5e75188582e277280fcde25dda0d6c9
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHaGmqfYtsvxf5:sh+ZkldoPK8YaGFfSk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-