Rewterz
Rewterz Threat Alert – Oski Data Stealer Malware – Active IOCs
September 7, 2021
Rewterz
Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 7, 2021

Rewterz Threat Alert – Agent Tesla Malware – Active IOCs

Severity

Medium

Analysis Summary

A new AgentTesla campaign is seen targeting victims with malspam. AgentTesla is known for stealing data from different applications on victim machines, such as browsers, FTP clients, and file downloaders. Agent Tesla collects personal information from the victim’s machine, steals data from the victim’s clipboard, can log keystrokes, capture screenshots, and access the victim’s webcam. It can kill running analysis processes and AVsoftware. The spyware also performs basic actions to check whether it is running on a virtual machine or in debug mode, in an attempt to hide its capabilities and actions from researchers. All the data it obtains is sent in encrypted form via SMTP protocol.

Impact

  • Credential Theft
  • Data Exfiltration
  • Information Disclosure

Indicators of Compromise

MD5

  • a58f79506d2d5dd64a9d8b3365277e84
  • 059bb09924b0d8cb7a8cffb72fd0bb03
  • 02c38765e78b0a2ebf927fc2cb9fe6a4
  • 35debb3a1918cd25c92b28a4cd689d85
  • dffdcf20552daf8cfd494b24b6734f26
  • e961711b994f75cb51d28d30f383a9a0
  • 9694f3b81157286656b59fb14722b45d

SHA-256

  • acce890737e0ad098a55c80d5a79208acee5262e3759ae5389083709597e96d6
  • 0abb52b3e0c08d5e3713747746b019692a05c5ab8783fd99b1300f11ea59b1c9
  • 145c2aa0e4eb2745aefa1af075ebf8c98dae5c1242824d00439c497f88c306c3
  • 4950adb6920bb8a3f9a37bfdab46c5f6c38236cacc1237f47732f30196c32bc3
  • 588cf49880e13ebf52438e8377d7c959fed298143f7a9fcc000cd654cb01e778
  • 526b4a1960089a844cdea329920a3842e2d18a26cf96fa52cbbde6fed7fa012a
  • 4fa607d7dbb9378fe5ac7b357bc3b746e08c2e52e67e13f5cfd450d08363e557

SHA-1

  • b5772c087c8de5ad87dacce591994e765a602f78
  • 87a02be494bc914211d91a45a9ccbf4d47238566
  • 2a6d63e49f4b4249e9d4c01dfba3b3159686a78a
  • e69dd6adb6d7ed7f3848ee76ee9780eb0e35ddf6
  • db5ae10955b0743f89a7664471462fcdd83e49d6
  • 19e98b4d85fc52d8e8d643b582b61ee7e367188a
  • a0a5544b5447f2641175d521427c94fa3b40870d

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.