Medium
An Agenttesla campaign is observed dropping email attachments that pretend to be a purchase order. The attachment is an ISO file. The C2 / Exfil site is a compromised site belonging to Iraq’s government (mail[.]cosqc[.]gov[.]iq) via smtp because the criminals are using SMTP port 587 and Start TLS which encrypts the email addresses as well as the contents. These malicious attachments yield stealers for passwords as well as bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials.
Email Subject
FW: Purchase Order – PO. 4029530
From Email
payment[@]buddiesholidays[.]in
Hostname
mail[.]cosqc[.]gov[.]iq (compromised)
Malware Hashes
MD5
SH256
SHA1
Source IP