General

  • Target

    winlogon.exe

  • Size

    462KB

  • Sample

    211202-x2m2sabddr

  • MD5

    629f5bb8b5ee75e90c393ad9d96a1772

  • SHA1

    b09925a7163bef858657a1b39146fe27abb01f99

  • SHA256

    15637f2d530662c968272c1e6e48ca6a093f0c828edf0cbb5cd32d9af03b3ff5

  • SHA512

    3434c0b1f42533c42a4232809a007ddfd340ebc0d500db436cd038e3d3b4aaf0fd8bcf36e3a1cee4442c5d894679f5cdc7cef5a90c04534f937121d6cc9e3857

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.stockmeieir.com
  • Port:
    587
  • Username:
    m.melendez@stockmeieir.com
  • Password:
    aU6sb@#1%Efh

Targets

    • Target

      winlogon.exe

    • Size

      462KB

    • MD5

      629f5bb8b5ee75e90c393ad9d96a1772

    • SHA1

      b09925a7163bef858657a1b39146fe27abb01f99

    • SHA256

      15637f2d530662c968272c1e6e48ca6a093f0c828edf0cbb5cd32d9af03b3ff5

    • SHA512

      3434c0b1f42533c42a4232809a007ddfd340ebc0d500db436cd038e3d3b4aaf0fd8bcf36e3a1cee4442c5d894679f5cdc7cef5a90c04534f937121d6cc9e3857

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks