Rewterz
Rewterz Threat Alert – Open Document format creates twist in maldoc landscape
October 10, 2019
Rewterz
Rewterz Threat Advisory – CVE-2019-10923 – Siemens Industrial Real-Time (IRT) Devices DoS Vulnerability
October 11, 2019

Rewterz Threat Alert – Another Agenttesla campaign using a compromised Iraq Government site

Severity

Medium

Analysis Summary

An Agenttesla campaign is observed dropping email attachments that pretend to be a purchase order. The attachment is an ISO file. The C2 / Exfil site is a compromised site belonging to Iraq’s government (mail[.]cosqc[.]gov[.]iq) via smtp because the criminals are using SMTP port 587 and Start TLS which encrypts the email addresses as well as the contents. These malicious attachments yield stealers for passwords as well as bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials.

Impact

  • Keylogging
  • Information Theft
  • Unauthorized Remote Access

Indicators of Compromise

Email Subject

FW: Purchase Order – PO. 4029530

From Email

payment[@]buddiesholidays[.]in

Hostname

mail[.]cosqc[.]gov[.]iq (compromised)

Malware Hashes

MD5

  • 948ab06c3ad8ff56fef7f5d50e647eeb
  • 91d6c671df51ea336208f8cf80ef6283

SH256

  • 3b0b880e65ae7ef1c34e57e3e43d924f78fd6a68ddc694094b6ff0d1621dda1c
  • 8eebcb7d52c969e6bb4704f11022afdf9d61462f96ad27e6859863fa681c77e6

SHA1

  • a2e0db01e3d4b7a1543a09564039a6ca64c183e1
  • 2bfbf256c019413ead6ee3ea0a76200e378d7019

Source IP

  • 108[.]167[.]161[.]64
  • 176[.]28[.]103[.]205
  • 192[.]185[.]10[.]45

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download email attachments coming from untrusted sources.
  • Do not execute untrusted files.