• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – New AgentTesla variant steals WiFi credentials
April 20, 2020
Rewterz Threat Alert – Latest Ursnif Campaign Targeting Organizations
April 21, 2020

Rewterz Threat Alert – Python RAT uses COVID-19 lures to target public and private sectors

April 21, 2020

Severity

High

Analysis Summary

A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam.
The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed “PoetRAT” due to various references to sonnets by English playwright William Shakespeare. The RAT has all the standard features of this kind of malware, providing full control of the compromised system to the operation. The malware specifically targets supervisory control and data acquisition (SCADA) systems in the energy industry, such as wind turbine systems, whose identities are currently not known.

The exact distribution mechanism of the Word document remains unclear, but given that the documents are available for download from a simple URL, the researchers suspect that victims are being tricked into downloading the RAT via malicious URLs or phishing emails, The campaign works by appending PoetRAT to a Word document, which, when opened, executes a macro that extracts the malware and runs it.

Impact

  • Exfiltrating sensitive documents
  • Keystrokes
  • Credential theft
  • Full control of victim’s system

Indicators of Compromise

SHA-256

  • 208ec23c233580dbfc53aad5655845f7152ada56dd6a5c780d54e84a9d227407
  • 252c5d491747a42175c7c57ccc5965e3a7b83eb5f964776ef108539b0a29b2ee
  • 312f54943ebfd68e927e9aa95a98ca6f2d3572bf99da6b448c5144864824c04d
  • 31c327a3be44e427ae062c600a3f64dd9125f67d997715b63df8d6effd609eb3
  • 37118c097b7dbc64fa6ac5c7b28ebac542a72e926d83564732f04aaa7a93c5e3
  • 4eb83253e8e50cd38e586af4c7f7db3c4aaddf78fb7b4c563a32b1ad4b5c677c
  • 5f1c268826ec0dd0aca8c89ab63a8a1de0b4e810ded96cdee4b28108f3476ce7
  • 66679d83d3993ae79229b1ccff5350e083d6631190eeeb3207fa10c3e572ca75
  • 746fbdee1867b5531f2367035780bd615796ebbe4c9043134918d8f9240f98b9
  • 970793967ecbe58d8a6b54f5ec5fd2551ce922cb6b3584f501063e5f45bdd58a
  • a3405cc1fcc6b6b96a1d6604f587aee6aafe54f8beba5dcbaa7322ac8589ffde
  • a703dc8819dca1bc5774de3b6151c355606e7fe93c760b56bc09bcb6f928ba2d
  • ac4e621cc5895f63a226f8ef183fe69e1ae631e12a5dbef97dd16a6dfafd1bfc
  • b14a8bf8575e46b5356acf3d19667278002935b21b7fc9f62e0957cc1e25209d
  • b1e7dc16e24ebeb60bc6753c54e940c3e7664e9fcb130bd663129ecdb5818fcd
  • ca8492139c556eac6710fe73ba31b53302505a8cc57338e4d2146bdfa8f69bdb
  • d4b7e4870795e6f593c9b3143e2ba083cf12ac0c79d2dd64b869278b0247c247
  • d5d7fad5b745fa04f7f42f61a1db376f9587426c88ce276f06de8ea6889dfae8
  • d605a01e42d5bb6bca781b7ba32618e2f2870a4624b50d6e3d895e8e96adee6a
  • F842354198cfc0a3296f8d3c6b38389761674f1636129836954f50c2a7aab740
  • e4e99dc07fae55f2fa8884c586f8006774fe0f16232bd4e13660a8610b1850a2

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.