Rewterz
Rewterz Threat Alert – Nanocore Rat – Active IOCs
June 21, 2021
Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
June 22, 2021

Rewterz Threat Alert – Agent Tesla Malware – Active IOCs

Severity

Medium

Analysis Summary

A new Agent Tesla campaign is seen targeting victims with malspam. AgentTesla is known for stealing data from different applications on victim machines, such as browsers, FTP clients, and file downloaders. Agent Tesla collects personal information from the victim’s machine, steals data from the victim’s clipboard, can log keystrokes, capture screenshots, and access the victim’s webcam. It can kill running analysis processes and AVsoftware. The spyware also performs basic actions to check whether it is running on a virtual machine or in debug mode, in an attempt to hide its capabilities and actions from researchers. All the data it obtains is sent in encrypted form via SMTP protocol.

Impact

  • Credential Theft
  • Data Exfiltration
  • Information Disclosure

Indicators of Compromise

MD5

  • 3d9c9fa8aa83f7bba525b6a2f5b80a17
  • 81c3f4268585c2aee9883d71ea160da8
  • 49cbc3d93b340d7fd363a04af9eb47e3
  • b1e73d4ebd938e3373a6a957255bfee1
  • b81e0112d358b4570c78b058bf9d8aad
  • 14ff88de9a90eb9a52be920456093338
  • fb71df2646eec64ce8f14ce079f475a0
  • a0174d0ce23bdc10aac6a50ab7540412
  • d8d6e959bf197ac2cf58849c96583d6b
  • 1e11f0003fc502aca3f4ca451a17eeb8
  • 03f63932cc94853cf993536c863b61ff
  • f017bd57e3b0db75235f3e40e7db1f55

SHA-256

  • c5aca589931c6b8142ae0be0c89ad5f821a7252afcdd2f69d6375d98e9372fe0
  • 8ef7418280178477553b2c62ef081e2ea1e78397075cca986e9527d9073a33f2
  • 27cbe0ee3ed2d3994d62ef21b9b2ebd3f929c5370336b16e96aef3a87b00fab6
  • 17143eb0ac72237157015c82aea83c0d16f94df25478110f25651089185ba9bf
  • 5e32b9920fbd332179288fbc1d5ed94f83e0cf164a28b8c63d20e5d0b8949f37
  • a2ab4d45b0c8718c31b8e315263577916f7e7dfc2b62c083ce4d4ca9a94f8451
  • 26429e599c50be0b0824ad9adffcfe1efcbbd16059e5c949f64b0dfdf93255cd
  • a4b39d55ec99198ecb996b335bbc980e86578a66a27263875f7b4cb072bfaeb2
  • 9bef7189757abd4b7e0f41686b082450e9292170ef34b8abf9a7d061935e37ce
  • 67a6cfdfbba1f1a044490fdb25c1ccd480dc0256ec757dc879babd9772ea685d
  • f6972d05dbe6c9245cad7aa933a49dbc9b39003c04ebff6b8850634b460f53e3
  • 7fb990250eb44087277f87e8365a30dcdebba19c2c4c4c89287630ff329af399
  • 488b0298f5ef4bd5164a82f6c000d5fedde71516efaffca53486bf320f2673d8
  • 50026b5278903570001d16c09d9a59925897363cb276a554f34df6529f1de906
  • 4eaf4d8f19165684c14aaa82b475babbb4d3631a802768f0a19b6f0d6fac7c75
  • fdadbd4c46042997032dd42646fce7dff6d60b97ab2469a53da4c2b7c1dc0157
  • 3eaaa6b669638e6ec06e41db2efde734d499a8e668622e7844972bdedb3473bf
  • 061f43fd63c6d12a3c6175cb6d8fd3cb2d8c7e074f3168ce33aaf0336cc902d2
  • 286b28b2a6b61cfb9cf76bfb3f88112c4212c0d1d5987456d3e7b35d009aecf4
  • 75299b0d9e1a3184a5f9fcdce9c6b8e2e9fc70c96249e26d2e1b46e88473edaa

SHA-1

  • 29c3d5702a4f16494986fd27f695b8fa84cee755
  • 797ae53d04b432fe33a0d2e557d3e8c91d787f44
  • 7cbca7087fffd4a27c1a691c866e020ed7bd81a4
  • 599d8a25e0297dbeffa706c525d60509e76f844b
  • bb0826309b53e419a118b0c121feba1818ea0d90
  • e2b7da28ef1dfcc2d1866556e22e6350ca84e54d
  • d562f66dbe9365b22f50ae31a4a6507715632995
  • 5316795ad1ff00e6db5b0d9f4b598f81d02a55c0
  • ece08bc51d0f1a70fa7ef70feab4f86ba3aab3c2
  • 303b17a67785d38b28b3e61214e5ce7f87109f85
  • c5a9e259d617fc1d761fc4c7f013d8112051a783
  • e95bd0f4104a54f17d07f88ede6d30ad5c85a448

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.