Rewterz Threat Alert – AZORult Malware – Active IOCs
March 30, 2022Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
March 30, 2022Rewterz Threat Alert – AZORult Malware – Active IOCs
March 30, 2022Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
March 30, 2022Severity
Medium
Analysis Summary
A new AgentTesla campaign is seen targeting victims with malspam. AgentTesla is known for stealing data from different applications on victim machines, such as browsers, FTP clients, and file downloaders. Agent Tesla collects personal information from the victim’s machine, steals data from the victim’s clipboard, can log keystrokes, capture screenshots and access the victim’s webcam. It can kill running analysis processes and AVsoftware. The spyware also performs basic actions to check whether it is running on a virtual machine or in debug mode, in an attempt to hide its capabilities and actions from researchers. All the data it obtains is sent in encrypted form via SMTP protocol.
Impact
- Credential Theft
- Data Exfiltration
- Information Disclosure
Indicators of Compromise
MD5
- 198ae098ee1062d23620a1a295d2abdf
- 1757664d8cb16d8ac34f3ff594e75265
- 36bc01f1a2d88a0d27c47a582ead8c7e
- 614dc2f797a349950f3749a59410d3a7
- dfbe3fb6337241aaf2576dea333c6dc6
- 661e7a5174da4ba544212a201f4ac081
- b1e6b5e71c78e1ced0f1202c45d52ec3
- e1463b37301ed5f83f3f82b52ad1a367
- e486f315c516d62729c6029926445dcf
- 976f76ebeda1d3bb4c28e66aa9afea51
SHA-256
- a0732064020bdb099cd5948a0caefadc8491e45bc6dcc98c57566033f520f09b
- eaefa3d8b32c13e6d21a7fb308e04c609685cef5f96aeaa0ac26c6dc86459178
- 980b3cbd822808ce9bcf9acf21c0cb4f1ca1106c47e0533e18669ade27f9ccac
- 1fb2f2de349dddb5f7193a8d88f1d4c9c0ccbbaf7d4c5ff8292a17ffb4666179
- 3008829dee0380dfd4456cd60d3ba93e11e4d5c6e712d395b8cf0beaef47aedc
- 5c31db3749200aada51747829cc8acc07caa0c8723bb5f25a935048e48fb1e03
- 81136ef7299680eb006669d2169cde0d5e9573831af9a187db053eba68c845c0
- 54760af4088f4381a5f313abc2d29203389cf2b0c2259be5fb0a24cb2563567c
- dbea1423f0bad7f114b89acccbecb9f1df6deffb838f7a83cb660fb03b11ac28
- 5c47acc274b44e92bb889f59ba4659e58d0d428003bf3e0c2de3ace7c224312b
SHA-1
- 50700015ac9c7ea26cdcbf792d6689de81cfaf0c
- fa533989a19b81e51314a8b893db26e14b9e436c
- c80064c65ffe2db8265140be24c72d4a965ed8d5
- bde860a8473465ebdc6f13f922f29cd21a1627ba
- 4e799b1c1eb6583d75097cee8a0777119cabf505
- 23b7dd65ab65848fedbe3906d41f5d851a76663d
- 6bae212e893419bbbff6d1118c3abfa683e86fd3
- 9b66b9a380dafaa9790c52c24a0240572cf72814
- 5cf849257dc43d900922e5ab2a0682c1a5841bee
- 26d0bc48d69b3524a60b863fafc28cf9cf2a5175
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.