Rewterz
Rewterz Threat Alert – FormBook Malware – Active IOCs
May 25, 2022
Rewterz
Rewterz Threat Alert – Mirai Botnet – Active IOCs
May 25, 2022

Rewterz Threat Alert – Agent Tesla Malware – Active IOCs

Severity

Medium

Analysis Summary

Malspam is being used to target victims in an Agent Tesla campaign. Since its initial appearance in 2014, this has been deployed in many forms, most notably via phishing attempts. AgentTesla is renowned for stealing data from a variety of target workstations’ apps, including browsers, FTP clients, and file downloaders. Agent Tesla grabs data from the victim’s clipboard, logs keystrokes, captures screenshots, and gains access to the victim’s webcam. It has the ability to terminate running analytic programs and anti-virus applications. In an attempt to disguise its capabilities and activities from researchers, the malware also runs simple checks to see if it is operating on a virtual machine or in debug mode.

Impact

  • Sensitive Data Theft
  • Credentials Theft

Indicators of Compromise

MD5

  • 8da9b05fd038121414d0ca3d44518133
  • 0292d736142e81cbc35310de782b78ba
  • d084050073da47d34f39f8f471ead57c
  • 6d1dd90ab41d602d97658749563526fc
  • 8626cfdf80a099bdc60f54f36552ea26
  • b5ff1bcda92e477b09da89dd802508b7
  • 0e741508f192e755948e9d522955569b
  • 79cf0c907bf11bb416ef0950e81b5042
  • ef0bfed39df203f1a6f902c4f091cc76
  • 709782a1984c34c24f41f1fb0a96cd5d

SHA-256

  • 2f4df54e63d52ee02191565ea5787e1ecbbdf070433a5a986561ebf78abcb91d
  • fb1afa6e7bae619514d7d2ff10a9cc96a03b5e10640059f592c7e5f3d6093d31
  • c5ed23b273a18cbe37e250a41fbc72faac02ffff6877c37ed33661e445f1001e
  • c21a8dd72ddc290ddef34bcf4af46c4fa56a5aba45b612ebcaa4eb4a1b955993
  • d71cf7a62479b0575847eeafd4acf947866a82dba4614ea9cd9493a8f59a85b3
  • 1b7382ea2de070f5b428fc1cab6608b28f475e928ac8bc26ab30bbfa21703a5c
  • d039a7ce3ad7b04f31e216966f1fb8f7bd90f982df74dfa34a7ae228f1b6efab
  • 6922c5cc87b43c29aedcc0ffa783587fd9f9ba05dbf5d2cdd07da01a50a8b931
  • 5f3ebf73e8084a3f0e9d2249516ed683222d2922301afbb81645df80bfdc1b5a
  • 36970d4f72161f9f6cbd444994359e0c416be009593960413870f5c0ebcf345b

SHA-1

  • 07c6389c7ff2ec8aabec300cb2e3298838b6c95b
  • cd76636de1d8fdda05909ec70a3022c865222df1
  • 833d5623b1f349969e452b562fa40e8b2aa72fe0
  • a5b4dfe0d8f5e6453c1c14bf57d9eccae8a68abe
  • cb167b9de50fd0534a51fd7806f1080c98328e6d
  • 4e0a070fa62602096eef4562d7f6bcb29cddf4a9
  • e05de634a391db80fb4d89b4cf0474a1db0c43b1
  • e73cb409884612b001f93d87ecb87acdf5e883d8
  • 4b10f06af79f495aaf828f4632ac3ed72e6a9131
  • 9525f3d3a49cc64bf616ff175a541372c5e1a061

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.