

Rewterz Threat Advisory – Multiple SAP BusinessObjects Business Intelligence Platform Vulnerabilities
August 11, 2022
Rewterz Threat Alert – Hive Ransomware – Active IOCs
August 11, 2022
Rewterz Threat Advisory – Multiple SAP BusinessObjects Business Intelligence Platform Vulnerabilities
August 11, 2022
Rewterz Threat Alert – Hive Ransomware – Active IOCs
August 11, 2022Severity
Medium
Analysis Summary
Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been
deployed in many forms, most notably via phishing attempts. AgentTesla is renowned for stealing data from a variety of
target workstations’ apps, including browsers, FTP clients, and file downloaders. Agent Tesla grabs data from the victim’s
clipboard, logs keystrokes, captures screenshots, and gains access to the victim’s webcam. It has the ability to terminate
running analytic programs and anti-virus applications. In an attempt to disguise its capabilities and activities from
researchers, the malware also runs simple checks to see if it is operating on a virtual machine or in debug mode.
Impact
- Sensitive Data Theft
- Credentials Theft
Indicators of Compromise
MD5
- fea743ac96b30d64f914d491e802abc1
- 57ecac082ee320cf94b2de1a0927a994
- 3332d7be19379c61a70336ee2e3ab2c9
SHA-256
- ce1e8e57264e84d75ed4960855768418c7a73707d0855d732228fd0259bb1049
- 9bc54f008c1a379e2a422b64b57339e7a3d8ee01745dd047999eab1006d060d1
- 07cfde854ea1e394643ec728dbbbdd45c893bedb56c8dd4861c749b62e384322
SHA-1
- 7fd429ceb24c476a9b3796fe71961575e7637738
- 117b1e130cc2f2406b0f38d3b3677e4699f65214
- e552e63d87a2385f88b69094619a4a513750258e
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.