• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – APT Group Gamaredon – Active IOCs
March 8, 2022
Rewterz Threat Alert – Nanocore Rat – Fresh IOCs
March 8, 2022

Rewterz Threat Alert – Agent Tesla Malware – Active IOCs

March 8, 2022

Severity

Medium

Analysis Summary

Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed in many forms, most notably via phishing attempts. AgentTesla is renowned for stealing data from a variety of target workstations’ apps, including browsers, FTP clients, and file downloaders. Agent Tesla grabs data from the victim’s clipboard, logs keystrokes, captures screenshots, and gains access to the victim’s webcam. It has the ability to terminate running analytic programs and anti-virus applications. In an attempt to disguise its capabilities and activities from researchers, the malware also runs simple checks to see if it is operating on a virtual machine or in debug mode.

Impact

  • Sensitive Data Theft
  • Credentials Theft
  • Steal Cryptocurrencies

Indicators of Compromise

Filename

  • LUIDANDATTRIBU[.]exe
  • ContractAbbreviatorAttrib[.]exe
  • SyncSortedL[.]exe
  • EventDescrip[.]exe
  • ChannelEn[.]exe

MD5

  • 284b2c8deb3c323ef533a1943380ec08
  • 9305a502a9989f1d7b68fb8cf0e14f60
  • 14972fd711aeba372d759ff002139321
  • d81a1d3e5e377927be094ea2364ba291
  • 346a9dff18e0f856cede3bf4a08dd8f1

SHA-256

  • 9655ee4ca1167f87d9245041ab59e861d6b3bdde7897a3b4cb2deee8550bdaaa
  • 44636c052353f293bd3302cb0844e7e3add7a2e929a63e6ccdafb6992eaa3e99
  • d30c20e0685764513feb26aec0cddb5040a2d50d4f65cf1872349d7b852f55ac
  • 5e8eb8d2e1ba90756915c1a717da45749c3fbc14ae25518cd694146f6fbd7891
  • f725b6a2466a6f4c7084eeab5994e30b8ef836633c1a84d85c1899deb1808d3c

SHA-1

  • 1d5546bab8eacf30867cb7e457a7483b8df37986
  • 9e066a8e4e96dc48e12737c0a998bd708bb21713
  • df322f3c1730fec853465bd03951d89aabd6d777
  • 8aea0040ba5fe121aa4217ed73ecdcd065270827
  • fb14b24abd737c27f5a4f040b82cb07c787ad7c8

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.