

Rewterz Threat Alert – New AgentTesla variant steals WiFi credentials
April 20, 2020
Rewterz Threat Alert – Latest Ursnif Campaign Targeting Organizations
April 21, 2020
Rewterz Threat Alert – New AgentTesla variant steals WiFi credentials
April 20, 2020
Rewterz Threat Alert – Latest Ursnif Campaign Targeting Organizations
April 21, 2020Severity
High
Analysis Summary
A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam.
The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed “PoetRAT” due to various references to sonnets by English playwright William Shakespeare. The RAT has all the standard features of this kind of malware, providing full control of the compromised system to the operation. The malware specifically targets supervisory control and data acquisition (SCADA) systems in the energy industry, such as wind turbine systems, whose identities are currently not known.
The exact distribution mechanism of the Word document remains unclear, but given that the documents are available for download from a simple URL, the researchers suspect that victims are being tricked into downloading the RAT via malicious URLs or phishing emails, The campaign works by appending PoetRAT to a Word document, which, when opened, executes a macro that extracts the malware and runs it.
Impact
- Exfiltrating sensitive documents
- Keystrokes
- Credential theft
- Full control of victim’s system
Indicators of Compromise
SHA-256
- 208ec23c233580dbfc53aad5655845f7152ada56dd6a5c780d54e84a9d227407
- 252c5d491747a42175c7c57ccc5965e3a7b83eb5f964776ef108539b0a29b2ee
- 312f54943ebfd68e927e9aa95a98ca6f2d3572bf99da6b448c5144864824c04d
- 31c327a3be44e427ae062c600a3f64dd9125f67d997715b63df8d6effd609eb3
- 37118c097b7dbc64fa6ac5c7b28ebac542a72e926d83564732f04aaa7a93c5e3
- 4eb83253e8e50cd38e586af4c7f7db3c4aaddf78fb7b4c563a32b1ad4b5c677c
- 5f1c268826ec0dd0aca8c89ab63a8a1de0b4e810ded96cdee4b28108f3476ce7
- 66679d83d3993ae79229b1ccff5350e083d6631190eeeb3207fa10c3e572ca75
- 746fbdee1867b5531f2367035780bd615796ebbe4c9043134918d8f9240f98b9
- 970793967ecbe58d8a6b54f5ec5fd2551ce922cb6b3584f501063e5f45bdd58a
- a3405cc1fcc6b6b96a1d6604f587aee6aafe54f8beba5dcbaa7322ac8589ffde
- a703dc8819dca1bc5774de3b6151c355606e7fe93c760b56bc09bcb6f928ba2d
- ac4e621cc5895f63a226f8ef183fe69e1ae631e12a5dbef97dd16a6dfafd1bfc
- b14a8bf8575e46b5356acf3d19667278002935b21b7fc9f62e0957cc1e25209d
- b1e7dc16e24ebeb60bc6753c54e940c3e7664e9fcb130bd663129ecdb5818fcd
- ca8492139c556eac6710fe73ba31b53302505a8cc57338e4d2146bdfa8f69bdb
- d4b7e4870795e6f593c9b3143e2ba083cf12ac0c79d2dd64b869278b0247c247
- d5d7fad5b745fa04f7f42f61a1db376f9587426c88ce276f06de8ea6889dfae8
- d605a01e42d5bb6bca781b7ba32618e2f2870a4624b50d6e3d895e8e96adee6a
- F842354198cfc0a3296f8d3c6b38389761674f1636129836954f50c2a7aab740
- e4e99dc07fae55f2fa8884c586f8006774fe0f16232bd4e13660a8610b1850a2
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.