• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Beware of Emails Asking You to “Confirm Your Unsubscribe” Request
August 5, 2019
Rewterz Threat Alert – Russian State Hackers are using IoT Devices to Breach Enterprise Networks
August 6, 2019

Rewterz Threat Alert – Kassino Campaign Spreading Agent Tesla via Phishing Emails

August 5, 2019

Severity

Medium

Analysis Summary

A new campaign dubbed “Kassino” spreading Agent Tesla malware, a known information stealing Trojan. Agent Tesla monitors and collects the victim’s keyboard inputs, system clipboard, screen shots of the victim’s screen, as well as collects credentials of a variety of installed software. Initial infection starts with a spear phishing email:

image-1565009145.png

Attached to this email is a zip file named “Averda7803.zip” and contains an executable file “jack.exe” which is the final stage malware. Once directly executed on the machine, the malware installs persistence mechanisms by executing VBS scripts via the RunOnce registry key. It then implements hooks into all the major browsers for the purpose of credential harvesting and stealing. One unique aspect of the malware is that it uses SMTP for command and control and exfiltration of data.

Impact

  • Information theft
  • Exposure of sensitive information

Indicators of Compromise

Filename

  • Averda7803.zip
  • jack.exe
  • filename.exe
  • filename.vbs

Malware Hash (MD5/SHA1/SH256)

  • 203AA57D68DDFA6C0E644D9E1CBB24DC
  • 4fafeeaf52bc073bbc56bed994d99b43
  • 3558065e64d9b53381250c357a4fabf392488e54

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.