Rewterz Threat Alert – AgentTesla Total Oil Themed Campaign
September 26, 2019Next Generation of Insider Threats
September 26, 2019Rewterz Threat Alert – AgentTesla Total Oil Themed Campaign
September 26, 2019Next Generation of Insider Threats
September 26, 2019Severity
High
Analysis Summary
PowerShell has gained popularity recently as a method for both installing malware and embedding malicious functionality within the script.
Infection Vector
The typical infection path to the target is email – an attachment in a phishing email for example. The PowerShell malware can be embedded in an attached Word document for example. When the user opens the Word Document attachment, a macro (actually a Visual Basic script) will run which loads and runs a PowerShell script. Macros will not normally run by default so the user must feel confident enough in the authenticity of the document to override the Windows warning and run the macro.
Impact
File encryption
Indicators of Compromise
URLs
- http[:]//home[.]tith[.]in/seven[.]sat
- http[:]//cofee[.]theshotboard[.]net/juy6tghn
- http[:]//aweb[.]theshotboard[.]info/
- http[:]//cofee[.]theshotboard[.]net/?page=xing&vid=vb1[:]load2f15f6ca34bbb72198afececf9627cbdf838821e1
- http[:]//cofee[.]theshotboard[.]net/?need=uuid&vid=dc1[:]loadjs& http[:]//qvo5sd7p5yazwbrgioky7rdu4vslxrcaeruhjr7ztn3t2pihp56ewlqd[.]onion/?guid=$edwfxew
Malware Hash (MD5/SHA1/SH256)
- d0d14b35d575825bfdac071a9dc57b029f8b1ba65627f172ec8bdca6cce9f53c
- 6be561d47a5e00773f5cea6a27db259046b71948cf01bc717598782f9b483e08
- 420fff9fea54ba0d56ef73817564a41336cc275e4154cbf9d2885a251a37cf76
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the link/attachments sent by unknown senders.