General

  • Target

    opkgdffg.exe

  • Size

    335KB

  • Sample

    231211-jwjkhsaeb3

  • MD5

    e42d457317360c8d5308efd134d7cdd1

  • SHA1

    873dcee67be13ddef3ed9145b6008c89b44eb4f3

  • SHA256

    c81410938b3279f11111fdb6a5be66bf5a52a2e902ad47aa6106ce32fa893acd

  • SHA512

    4035e3976ed3b8980473d2361acc9e1bdf514542d6d838d59b5e864a83f166c55e145a3f2504e99a3b9f8862254d40af6b6a17f2f6852eb276e8429a8d38a7a6

  • SSDEEP

    6144:W6sAuV9qFsBDNkRvmJ6MRmAWoWQj+cFFGWeqv4iPvFTwCHxrdQ8eq844iFECA4OQ:W6BTFsBDN5J6OmxohFnXTVG8eAFE6OI

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6669461375:AAGwrSGDuGS4lzGe3ziI4ubZc9TzQ8r1m8o/

Targets

    • Target

      opkgdffg.exe

    • Size

      335KB

    • MD5

      e42d457317360c8d5308efd134d7cdd1

    • SHA1

      873dcee67be13ddef3ed9145b6008c89b44eb4f3

    • SHA256

      c81410938b3279f11111fdb6a5be66bf5a52a2e902ad47aa6106ce32fa893acd

    • SHA512

      4035e3976ed3b8980473d2361acc9e1bdf514542d6d838d59b5e864a83f166c55e145a3f2504e99a3b9f8862254d40af6b6a17f2f6852eb276e8429a8d38a7a6

    • SSDEEP

      6144:W6sAuV9qFsBDNkRvmJ6MRmAWoWQj+cFFGWeqv4iPvFTwCHxrdQ8eq844iFECA4OQ:W6BTFsBDN5J6OmxohFnXTVG8eAFE6OI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.