Detection Content: COVID-19 Related Attack at Medical Suppliers

New Sigma rule by Osman Demir helps to detect COVID-19 related phishing attacks targeted at medical suppliers.

The campaign became known at the end of last week, and researchers believe that it is associated with 419 scammers who exploit the COVID-19 pandemic for Business Email Compromise attacks. Adversaries send highly targeted phishing emails with malicious MS Word documents inquiring about various materials needed to address the COVID-19 pandemic. The document exploits old but still effective CVE-2017-11882 vulnerability to deliver Agent Tesla infostealer. AgentTesla is a modular .Net-based malware that steals data from different applications and WiFi credentials, this commercial malware is one of the favorite tools of BEC scammers. 

Osman Demir published his first content in the late November 2019, and now he has 100+ published rules, including content addressing the Wanted List requests. Interview with Osman Demir:


Threat Detection is supported for the following platforms:

SIEM: Azure Sentinel, ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, Logpoint, Humio, RSA NetWitness

EDR: Carbon Black, Elastic Endpoint



Tactics: Initial Access

Technique: Spearphishing Attachment (T1193)


Other rules related to this campaign:

AgentTesla RAT Detection rule by Emir Erdogan –

Powershell Obfuscation By AgentTesla rule by Emir Erdogan –

Agent Tesla behavior (Sysmon and Powershell detection) by Ariel Millahuel –  

Steal Wifi Passwords (using upgraded agent tesla) by Osman Demir –

CVE-2017-11882 Exploitation by Florian Roth –

Exploitation of CVE-2017-11882 (possible APT27 attack) by Emir Erdogan –

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts