Rewterz Threat Alert – Phobos Ransomware – Active IOCs
May 31, 2022Rewterz Threat Alert – Mirai Botnet – Active IOCs
May 31, 2022Rewterz Threat Alert – Phobos Ransomware – Active IOCs
May 31, 2022Rewterz Threat Alert – Mirai Botnet – Active IOCs
May 31, 2022Severity
Medium
Analysis Summary
Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed in many forms, most notably via phishing attempts. AgentTesla is renowned for stealing data from a variety of target workstations’ apps, including browsers, FTP clients, and file downloaders. Agent Tesla grabs data from the victim’s clipboard, logs keystrokes, captures screenshots, and gains access to the victim’s webcam. It has the ability to terminate running analytic programs and anti-virus applications. In an attempt to disguise its capabilities and activities from researchers, the malware also runs simple checks to see if it is operating on a virtual machine or in debug mode.
Impact
- Sensitive Data Theft
- Credentials Theft
Indicators of Compromise
MD5
- 5c78e63eb805edbe1b450c76f8879535
- b96f60ec341e84004be42b9fdffd428b
- b7b4c75aa6fcb2d25f03b18be1c1ac21
- 9fdac1c335590d498336b448f0347e4e
- 9464924bfd52a18b63c9a42aa6fd69b3
- cf332a86b573a221becf7b1779ffbc79
- 774dc24913995cb317332cb81b19661d
- b9f62d735aefea6e1c8d1101b857888c
SHA-256
- ee58fffb2f0dbe2c87c285fb29a8a7624bd7eb47003b96988ace8b9d024fc5ba
- 18c5a3095c046015c7ae1e35d3c1050ff08314d512b459ef78c8a9e443be57cd
- 75b71e98538b3a0c6733601ec35c69f6956488a6218ad0873d6daf946528efaf
- 147b4cb4e656c1d85af1f6900eaf4c63824ebef3eb8f0d8579f204889e44d831
- 1c8860d2bbd8955bbd806fa39cb2c8f8cd403213d5a1ed9c89c80058dbcc92de
- 6a54b178b2c46bd2e2538596e590351892e3c645f8bd38226d81795354f512d3
- 9b62596acad4beed483b056c2e319417d81c10b35cf911e53b263b72da907847
- 544f083c52ec850c4cd9459638f2bf167adc2d5194441e7ebc9d6c57e8233876
SHA-1
- 0bd2ad43fb2958a822709709440f2426b7e29182
- b7beb1e6251dc2ee9d5f27eff4f596269c09fe97
- 0cd9e3cefbb89245f52c7f5f5cadc6d63620cc92
- ffbe4ac6ab3a961811e6f540a5a501a438026840
- 7e1dd87e1f9776b394e24be18a5b1d40542b8785
- d31ef1ee39c3c325ff892c5947a39e43698e82e4
- 380496ff6b5992b678829f8ed2e656a066026752
- 7c4812e9ffc0de0e3528dd50378449d1618a97c6
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment