Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Analysis Summary
TA505 threat group campaign that masquerades as email from “National Tax Inspectorate for interrogation”.
The initial point of infection sources from an email with the subject “National Tax Code”. Example email:
This spreadsheet contains malicious macros that, once enabled, download and execute the first stage malware “wiskkk.exe”. This executable downloads and executes winserv.exe, the final stage malware, also known as RMS (Remote Manipulator System). RMS is a known remote administration tool by TektonIT and allows complete access to the target system.
Impact
Unauthorized system access
Indicators of Compromise
IP(s) / Hostname(s)
217[.]12[.]201[.]159
Malware Hash (MD5/SHA1/SH256)
Email Subject
National Tax Code
Filename
Remediation