

Rewterz Threat Alert – Open Document format creates twist in maldoc landscape
October 10, 2019
Rewterz Threat Advisory – CVE-2019-10923 – Siemens Industrial Real-Time (IRT) Devices DoS Vulnerability
October 11, 2019
Rewterz Threat Alert – Open Document format creates twist in maldoc landscape
October 10, 2019
Rewterz Threat Advisory – CVE-2019-10923 – Siemens Industrial Real-Time (IRT) Devices DoS Vulnerability
October 11, 2019Severity
Medium
Analysis Summary
An Agenttesla campaign is observed dropping email attachments that pretend to be a purchase order. The attachment is an ISO file. The C2 / Exfil site is a compromised site belonging to Iraq’s government (mail[.]cosqc[.]gov[.]iq) via smtp because the criminals are using SMTP port 587 and Start TLS which encrypts the email addresses as well as the contents. These malicious attachments yield stealers for passwords as well as bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials.
Impact
- Keylogging
- Information Theft
- Unauthorized Remote Access
Indicators of Compromise
Email Subject
FW: Purchase Order – PO. 4029530
From Email
payment[@]buddiesholidays[.]in
Hostname
mail[.]cosqc[.]gov[.]iq (compromised)
Malware Hashes
MD5
- 948ab06c3ad8ff56fef7f5d50e647eeb
- 91d6c671df51ea336208f8cf80ef6283
SH256
- 3b0b880e65ae7ef1c34e57e3e43d924f78fd6a68ddc694094b6ff0d1621dda1c
- 8eebcb7d52c969e6bb4704f11022afdf9d61462f96ad27e6859863fa681c77e6
SHA1
- a2e0db01e3d4b7a1543a09564039a6ca64c183e1
- 2bfbf256c019413ead6ee3ea0a76200e378d7019
Source IP
- 108[.]167[.]161[.]64
- 176[.]28[.]103[.]205
- 192[.]185[.]10[.]45
Remediation
- Block the threat indicators at their respective controls.
- Do not download email attachments coming from untrusted sources.
- Do not execute untrusted files.