General
-
Target
SecuriteInfo.com.MSIL.Kryptik.HDZY.tr.18191.767.exe
-
Size
690KB
-
Sample
241008-jtvj1azfnf
-
MD5
dd2f23684673ca3e5c9f578764769b67
-
SHA1
df4b4d3a081e4a9160feef06452a7a4b9f2687b9
-
SHA256
f707fe133dc28a26c1bf930647601bc36d7ffdabe046c8eac7a9c6c23e11e2ff
-
SHA512
7c47800fd704dd2a66110db05d08d570086985db8c64d073b9a5007a4a2b563f66e5740d7ee2f39c16172fc0b1336473d92c79719a664c38ee0f8292c9c71613
-
SSDEEP
12288:CnCnlWQQlEMqeT9M0czOdmAEXut89Pj0hoLmCEtYCmE:bl9QWaMXzOdMX94hoK5t2E
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.MSIL.Kryptik.HDZY.tr.18191.767.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6712831410:AAHcAQdRCEA5D54-vSqmAsfuFOnMq6rPNCg/
Targets
-
-
Target
SecuriteInfo.com.MSIL.Kryptik.HDZY.tr.18191.767.exe
-
Size
690KB
-
MD5
dd2f23684673ca3e5c9f578764769b67
-
SHA1
df4b4d3a081e4a9160feef06452a7a4b9f2687b9
-
SHA256
f707fe133dc28a26c1bf930647601bc36d7ffdabe046c8eac7a9c6c23e11e2ff
-
SHA512
7c47800fd704dd2a66110db05d08d570086985db8c64d073b9a5007a4a2b563f66e5740d7ee2f39c16172fc0b1336473d92c79719a664c38ee0f8292c9c71613
-
SSDEEP
12288:CnCnlWQQlEMqeT9M0czOdmAEXut89Pj0hoLmCEtYCmE:bl9QWaMXzOdMX94hoK5t2E
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1