• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Mail Protection • Malware  /  Coronavirus-themed Campaign delivers Agent Tesla Malware
Coronavirus-themed Campaign delivers Agent Tesla Malware
12 May 2020

Coronavirus-themed Campaign delivers Agent Tesla Malware

Written by Aniruddha Dolas
Aniruddha Dolas
Cybersecurity, Mail Protection, Malware

While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and attacking vulnerable users & businesses. In the last few weeks, there has been a rise in coronavirus-themed malspams, which are being used to deliver a variety of malware. At Quick Heal Security Labs, we have observed Agent Tesla being delivered through such campaigns — the main motive of these campaigns is to steal sensitive data by capturing keystrokes, taking screenshots, & dumping browser passwords, etc.

Campaign Details: We have observed a variety of coronavirus-themed Agent Tesla Campaigns. Below are different categories:
• Exploiting MS office vulnerability CVE-2017-11882
• Exploiting MS office vulnerability CVE-2017-8570
• Archives with double extension executable (ZIP, RAR etc.)

Variant 1 – Technical Details

A victim receives a phishing mail with an attachment titled as “COVID 19 NEW ORDER FACE MASKS.doc.rtf “. This doc is an RTF file that exploits CVE-2017-11882 which is a stack-based buffer overflow vulnerability present in the Microsoft Equation editor tool. This vulnerability allows the attacker to run arbitrary code and after successful exploitation to deliver the Agent Tesla payload. This dropped payload performs code injection in known windows process RegAsm.exe. The injected code in RegAsm.exe performs all info-stealing activity and sends it to the CnC server.

Attack Chain
Fig. 1 Attack Chain

The RTF file is highly obfuscated with several invalid control words and whitespaces. After deobfuscating file, the following API calls are present in this file.

Fig. 2 Shellcode in RTF file
Fig. 2 Shellcode in RTF file
Fig.3 Shellcode in RTF file
Fig.3 Shellcode in RTF file

Payload Analysis: The .NET payload is downloaded from CVE-2017-11882 exploit. When the execution begins, it starts decrypting the resource section where the malicious code is stored. Using the process-injection method, it injects its code to a genuine Microsoft file, RegAsm.exe to bypasses security products. The purpose of this payload is to steal sensitive data, log user keys and to send this data to the SMTP server.

 Variant 2 – Technical Details

A victim receives a phishing mail with an attachment titled as “COVID-19 SUSPECTED AFFECTED VESSEL.doc” OR “COVID-19 measures for FAIRCHEM STEED, Voyage (219152).doc”. This doc is an RTF file containing OLE2Link object to exploit CVE-2017-8570. This vulnerability triggers the execution of scripts without user interaction. After successful exploitation, winword.exe process drops embedded .sct file and executes it. The .sct file contains code as shown below, which executes PowerShell.exe to download and execute payload from a remote server.

Fig. 4 Attack Chain
Fig. 4 Attack Chain

The composite moniker (C6AFABEC197FD211978E0000F8757E2A) is present in the RTF file to execute a .sct file on the victim’s machine. Due to the improper handling of objects in memory, office application drops and successfully executes scriptlet file(.sct) which results in the execution of malicious code present in the .sct file.

Fig.5 Moniker CLSID and dropped location of .sct file
Fig.5 Moniker CLSID and dropped location of .sct file

The following figure shows the code —  the .sct file contains obfuscated PowerShell code.

Fig.6 Obfuscated .sct file
Fig.6 Obfuscated .sct file

Payload Analysis: The .NET payload is downloaded by the above CVE-2017-8750 exploit. When execution starts, it checks for an own instance, and if found, it throws an exception and terminates itself. If not found, it starts decrypting the resource section where the malicious dll is stored. Self-injection method is used to inject a dll in an own file. When a new instance of self-process gets started, it drops a shortcut (.lnk) file at startup to establish persistence and changes the attributes of own file to hidden. The purpose of this payload is to steal sensitive data, log user keys and send data to the SMTP server.

Variant 3 – Technical Details

A victim receives a phishing mail that carries archived attachments of different types like ZIP, RAR, etc. with a name such as “COVID-19 Supplier Notice.zip”. This malicious archived attachment will then extract  AutoIT-compiled version of Agent Tesla malware with a name such as “COVID-19 Supplier Notice.jpg.exe”. When this payload starts, it performs code injection in a known Windows process, RegAsm.exe. —  after the successful execution, the payload starts the info-stealing activity.

FIg. 7 Attack Chain
FIg. 7 Attack Chain

Payload Analysis: When the execution is started, it creates a .URL file at startup location which contains a link to a .VBS file dropped at ‘srdelayed’ location. The self-copy in ‘srdelayed’ folder is created at the same location from where file execution has begun. It starts decrypting resource section where the actual malicious code is stored. Here, AutoIt resource section contains .NET code and using Process-injection method, it injects its code to Microsoft genuine file RegAsm.exe, also a .NET file. The purpose of this payload is to steal sensitive data, log user keys and perform data exfiltration over SMTP.

Final Stage Payload Analysis:

Below is the analysis of the first variant which is very similar to the other two variants.

The malicious code is stored in the resource section of the binary.

Fig. 8 Resource Section
Fig. 8 Resource Section

After data decryption in memory, dll gets loaded and it again starts to decrypt a final malicious code in memory which further injects into self or in a RegAsm.exe process.

Fig. 9 Decryption of .NET code
Fig. 9 Decryption of .NET code

After self-injection of this decrypted code, it starts collecting system information like Username, Computername, OSFullName and other basic information. It also starts to steal the data from browsers. It has up to 25 hardcoded lists of browsers along with their path out of which few are as mentioned below –

Fig. 10 Browser Lists
Fig. 10 Browser Lists

It also has a list of email clients along with their paths from where it steals email data and sends to its CnC Server.

The payload can capture the screenshots of the current window in a JPG format with some time interval.  The captured image as the one seen below is sent to the email server by creating an SMTP client.

Fig. 11 SMTP client details
Fig. 11 SMTP client details

The image is sent to one hardcoded email ID, ‘amani@planetships.net’ with subject name as SC_<username>  with a message body containing the information of victim’s system and the captured image as an attachment.

Copying data from the clipboard is another functionality of this payload — it stores all the copied data in an array.

Fig. 12 Getting a copy of the clipboard data
Fig. 12 Getting a copy of the clipboard data

Keylogging activity is present in this payload — it first checks for the keyboard layout post which it captures all the keyboard events.

Fig. 13 Getting the details of the keyboard keys
Fig. 13 Getting the details of the keyboard keys

Protection by Quick Heal

Our advanced signature-less Behavior-Based detection successfully blocks all known Agent Tesla variants.

 

Conclusion

Actors behind these campaigns are capitalizing on the global Coronavirus panic to distribute Agent Tesla malware and steal sensitive user information. Quick Heal advises users to exercise ample caution and avoid opening attachments & clicking on web links in unsolicited emails. Users should also keep their Operating System updated and have a full-fledged security solution installed on all devices

Quick Heal’s research team is proactively monitoring all campaigns related to COVID-19 and working relentlessly to ensure the safety of our customers

 

MITRE ATT&CK TIDs

Tactic Technique
Initial Access Spearphishing Attachment
Initial Access Spearphishing Link
Execution Execution through API
Execution Exploitation for Client Execution
Execution PowerShell
Execution Scripting
Persistence Registry Run Keys / Startup Folder
Defence Evasion Obfuscated Files or Information
Defence Evasion Process Hollowing
Defence Evasion Scripting
Credential Access Credential Dumping
Credential Access Credentials in Files
Discovery Query Registry
Discovery System Information Discovery
Collection Clipboard Data
Collection Input Capture
Collection Screen Capture
Command And Control Remote File Copy
Command And Control Standard Application Layer Protocol
Exfiltration Exfiltration Over Alternative Protocol

 

IOCs:

527142E25A8229D1DC910AF23CDB5256 (DOC)

C1B04A9474CA64466AD4327546C20EFC (DOC)

F1E95D1E23A582E4EF8B19E55E21D40E (PE)

6D5ED323EF55F7BD34BC193DDC8AFE74 (PE)

C3166A86DBF5B6A95FC723EF639DAD45 (PE)

5[.]189[.]132[.]254

107[.]189[.]7[.]179

 

Subject Matter Expert:

  • Aniruddha Dolas
  • Pavankumar Chaudhari
  • Bajrang Mane

 Previous PostJava RAT Campaign Targets Co-Operative Banks in India
Next Post  Transparent Tribe Targeting Critical Indian Organizations
Aniruddha Dolas

About Aniruddha Dolas

Aniruddha Dolas is part of the HIPS (Host-based Intrusion Prevention System) team in Quick Heal Security Labs. He has worked on various security vulnerabilities...

Articles by Aniruddha Dolas »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies