General
-
Target
ORDER (6256 OS)#391 PI.exe
-
Size
853KB
-
Sample
221209-k9l38sff7w
-
MD5
19081ef2a08f678a3203b29124043c41
-
SHA1
e86acea06a600f170402a0c1020c25ac2550ffa0
-
SHA256
2f356283c209400c6385a24450f266b59477e035e9389c8d1af4843cd1ad2374
-
SHA512
aad284ae800f26f6d27a12ec66cd42c781861de7fbd907b8c5b3938dc8fa343286b35e21a56c3680cc92e36d1857fb8f1fd53796f3a82be182245493855ffa3f
-
SSDEEP
24576:F2ibxF1RKDbH8emeHmXlO3Qe5/uwg5+RAj:/xFqXHXmeOlO3QW/2e
Static task
static1
Behavioral task
behavioral1
Sample
ORDER (6256 OS)#391 PI.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ORDER (6256 OS)#391 PI.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/
Targets
-
-
Target
ORDER (6256 OS)#391 PI.exe
-
Size
853KB
-
MD5
19081ef2a08f678a3203b29124043c41
-
SHA1
e86acea06a600f170402a0c1020c25ac2550ffa0
-
SHA256
2f356283c209400c6385a24450f266b59477e035e9389c8d1af4843cd1ad2374
-
SHA512
aad284ae800f26f6d27a12ec66cd42c781861de7fbd907b8c5b3938dc8fa343286b35e21a56c3680cc92e36d1857fb8f1fd53796f3a82be182245493855ffa3f
-
SSDEEP
24576:F2ibxF1RKDbH8emeHmXlO3Qe5/uwg5+RAj:/xFqXHXmeOlO3QW/2e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-