Threat Group Aggah (TH-157)

  |  Source: 

Threat Group - Aggah (TH-157)

Research from Yoroi Malware ZLAB has been tracking threat actor group Aggah (TH-157) since 2019. The group's recent activity has been targeting Ukraine, Lithuania, Italy, and additional east European countries, in which they have been conducting reconnaissance and data theft operations. A shared technical analysis identifies a nine-stage attack that involves establishing persistence to deliver a final payload. The initial vector comes from a malicious PowerPoint document using the "autoclose" macro to aid in bypassing sandbox checks and is delivered through spam emails. MSHTA execution leads to a bitly link leading to a fraudulent Blogspot page with the payload executing wscript and creating a scheduled task. Payload delivery involves the AgentTesla infostealer. The threat actor is able to vary the payload delivery infrastructure every 80 mins due to the scheduled task calling MSHTA to retrieve another Blogspot page.


Get trending threats published weekly by the Anvilogic team.

Sign Up Now