General
-
Target
opkgdffg.exe
-
Size
335KB
-
Sample
231211-jwjkhsaeb3
-
MD5
e42d457317360c8d5308efd134d7cdd1
-
SHA1
873dcee67be13ddef3ed9145b6008c89b44eb4f3
-
SHA256
c81410938b3279f11111fdb6a5be66bf5a52a2e902ad47aa6106ce32fa893acd
-
SHA512
4035e3976ed3b8980473d2361acc9e1bdf514542d6d838d59b5e864a83f166c55e145a3f2504e99a3b9f8862254d40af6b6a17f2f6852eb276e8429a8d38a7a6
-
SSDEEP
6144:W6sAuV9qFsBDNkRvmJ6MRmAWoWQj+cFFGWeqv4iPvFTwCHxrdQ8eq844iFECA4OQ:W6BTFsBDN5J6OmxohFnXTVG8eAFE6OI
Static task
static1
Behavioral task
behavioral1
Sample
opkgdffg.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
opkgdffg.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6669461375:AAGwrSGDuGS4lzGe3ziI4ubZc9TzQ8r1m8o/
Targets
-
-
Target
opkgdffg.exe
-
Size
335KB
-
MD5
e42d457317360c8d5308efd134d7cdd1
-
SHA1
873dcee67be13ddef3ed9145b6008c89b44eb4f3
-
SHA256
c81410938b3279f11111fdb6a5be66bf5a52a2e902ad47aa6106ce32fa893acd
-
SHA512
4035e3976ed3b8980473d2361acc9e1bdf514542d6d838d59b5e864a83f166c55e145a3f2504e99a3b9f8862254d40af6b6a17f2f6852eb276e8429a8d38a7a6
-
SSDEEP
6144:W6sAuV9qFsBDNkRvmJ6MRmAWoWQj+cFFGWeqv4iPvFTwCHxrdQ8eq844iFECA4OQ:W6BTFsBDN5J6OmxohFnXTVG8eAFE6OI
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-