• delivr.to Feed
High Severity

Link: PIF File from Suspicious Source (AgentTesla)

Labels

No labels.

Description

A delivery technique leveraged for AgentTesla infostealer malware. A link to a hosted or auto-downloading PIF file.

@delivr_to
Created May 24th, 2024 • Last updated May 24th, 2024
Feed Source
delivr.to Feed
Source
type.inbound

and any(body.links,
    1 of (
        // Original AgentTesla Link
        network.whois(.href_url.domain).registrant_country_code =~ "RU",
        // Other suspicious attributes of link
        network.whois(.href_url.domain).days_old < 30,
        .href_url.domain.domain in $free_subdomain_hosts,
        .href_url.domain.domain in $free_file_hosts,
        .href_url.domain.root_domain in $free_subdomain_hosts,
        .href_url.domain.root_domain in $free_file_hosts,
        sender.email.domain.domain == "delivrto.me"
    )

    and 1 of (
        // Static URL analysis, link ends with PIF
        strings.iends_with(.href_url.url, ".pif"),

        // Payload fetch, file is PIF or has NSIS indicators
        any(ml.link_analysis(.href_url).files_downloaded,
            .file_extension == "pif" or 
            any(file.explode(.),
                any(.flavors.yara, . == "mz_file") and 
                any(.scan.strings.strings,
                    strings.ilike(., 
                        "*Nullsoft Install System*", 
                        "*NSIS*"
                    )
                )
            ) 
        )
    )
)

and (
  (
  profile.by_sender().prevalence in ("new", "outlier")
  and not profile.by_sender().solicited
  ) 
  or sender.email.domain.domain == "delivrto.me"
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started