Medium
Amid the COVID-19 pandemic, several threat actors have taken to using the virus and subsequent pandemic as a means of infiltration to victim’s computers. Agent Tesla, an information stealing malware, has been used extensively in these types of campaigns.
A victim receives a phishing mail with an attachment titled as “COVID 19 NEW ORDER FACE MASKS.doc.rtf “. This doc is an RTF file that exploits CVE-2017-11882 which is a stack-based buffer overflow vulnerability present in the Microsoft Equation editor tool.
This vulnerability allows the attacker to run arbitrary code and after successful exploitation to deliver the Agent Tesla payload. This dropped payload performs code injection in known windows process RegAsm.exe. The injected code in RegAsm.exe performs all info-stealing activity and sends it to the CnC server.
Email Subject
IP
MD5