VRad

#agenttesla_100221

Feb 10th, 2021 (edited)
535
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.33 KB | None | 0 0
  1. #IOC #OptiData #VR #AgentTesla #AgentTeslaV3 #TGZ
  2.  
  3. https://pastebin.com/9JXvM5ix
  4.  
  5. previous_contact:
  6. 07/12/20 https://pastebin.com/20AVUqZ6
  7. 04/12/20 https://pastebin.com/PYFMBfkg
  8. 15/06/20 https://pastebin.com/pma5MQAW
  9. 12/06/20 https://pastebin.com/SKNts0Es
  10. 29/10/19 https://pastebin.com/RinpBPvy
  11. 03/09/19 https://pastebin.com/zhJvDz8M
  12. 09/01/19 https://pastebin.com/MdDfZDdb
  13. 16/10/18 https://pastebin.com/d5DxTRrB
  14. 04/10/18 https://pastebin.com/JYShuXn4
  15. 11/10/18 https://pastebin.com/bkCSvJvM
  16.  
  17. FAQ:
  18.  
  19. attack_vector
  20. --------------
  21. email > URL to onedrive > TGZ > EXE > exfil to smtp.1and1.es:587
  22.  
  23. email_headers
  24. --------------
  25. Received: from server.cdcnet.hu (server.cdcnet.hu [89.132.146.50])
  26. Received: from localhost (localhost.localdomain [127.0.0.1])
  27. by server.cdcnet.hu (Postfix) with ESMTP id C787D3C4;
  28. with ESMTP id MYnIjZSd9U-H; Wed, 10 Feb 2021 09:28:42 +0100 (CET)
  29. Received: from cdcnet.hu (localhost [IPv6:::1])
  30. by server.cdcnet.hu (Postfix) with ESMTP id 93B287C3;
  31. Date: Wed, 10 Feb 2021 03:28:34 -0500
  32. From: ПриватБанк | Оплата та виставлення рахунків <[email protected]>
  33. Subject: Копія платіжного доручення
  34. In-Reply-To: <[email protected]>
  35. References: <CACMRaMXLhBoJfYAQhxqSAdNu-DnLF7ktbMLxpub8i3_ngFV=LQ@mail.gmail.com>
  36. User-Agent: Roundcube Webmail/1.2.3
  37.  
  38. files
  39. --------------
  40. SHA-256 c0b7cb8bb82ab3b25c87aaf5aee2679857c030bb216272dc49d2d3d157a9cc9d
  41. File name Платіжне доручення.tgz [ GZIP ]
  42. File size 484.20 KB (495821 bytes)
  43.  
  44. SHA-256 3dfa161fda2d67e9e1a2e90308a0bdc4ef9736b8f26152fd0264dd03591e66dd
  45. File name Платіжне доручення.exe [ .NET executable ]
  46. File size 917.50 KB (939520 bytes)
  47.  
  48. unpacked from exe
  49. --------------
  50. SHA-256 76d943b7ec3646eb97870f85001cae19a2cd552b72fb4dc00d354ce8715b80f9
  51. File name child1.exe [ .NET executable ]
  52. File size 407.50 KB (417280 bytes)
  53.  
  54. SHA-256 2c2fbae20d46eb124ff52f0894e82490e5e1c9f044d115a5fbc590d611bea6de
  55. File name child2.exe [ .NET executable ]
  56. File size 216.00 KB (221184 bytes)
  57.  
  58. SHA-256 2b2bcf851c2b87033fd24c890c2a1de3642564f7cec7282982d96b8280baa849
  59. File name child3.exe [ .NET executable ]
  60. File size 12.50 KB (12800 bytes)
  61.  
  62.  
  63. activity
  64. **************
  65. PL_SCR current
  66. https://onedrive.live.com/download?cid=44BBFEE50A375AFB&resid=44BBFEE50A375AFB!3900&authkey=AE3hRpZjTZyiajM
  67.  
  68. previous
  69. (07/12/20) https://onedrive.live.com/download?cid=22B7C997915C7868&resid=22B7C997915C7868%21282&authkey=AIrAAExjvidyMqA
  70. (04/12/20) https://onedrive.live.com/download?cid=22B7C997915C7868&resid=22B7C997915C7868%21277&authkey=ANqq4raBmU8qCug
  71.  
  72. C2 212.227.15.158:587 [smtp.1and1.es]
  73.  
  74.  
  75. !Steals private information from local Internet browsers
  76. --------------
  77. C:\Users\operator\AppData\Roaming\Opera Software\Opera Stable
  78. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\profiles.ini
  79. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\Profiles\axdea46y.default\key4.db
  80. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\Profiles\axdea46y.default\logins.json
  81. C:\Users\operator\AppData\Roaming\Opera Mail\Opera Mail\wand.dat
  82. C:\Users\operator\AppData\Roaming\Comodo\IceDragon\profiles.ini
  83.  
  84. !Harvests credentials from local FTP client softwares
  85. --------------
  86. C:\Users\operator\AppData\Roaming\FTPGetter\servers.xml
  87. C:\Users\operator\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
  88. C:\Users\operator\AppData\Roaming\CoreFTP\sites.idx
  89.  
  90. !Harvests information related to installed mail clients
  91. --------------
  92. C:\Users\operator\AppData\Roaming\Postbox\profiles.ini
  93. C:\Users\operator\AppData\Roaming\eM Client
  94. C:\Users\operator\AppData\Roaming\Thunderbird\profiles.ini
  95. C:\Users\operator\AppData\Roaming\The Bat!
  96. C:\Users\operator\AppData\Roaming\Claws-mail\clawsrc
  97. C:\Users\operator\AppData\Roaming\Pocomail\accounts.ini
  98.  
  99. netwrk
  100. --------------
  101. 212.227.15.158 smtp.1and1.es Client Hello
  102.  
  103. comp
  104. --------------
  105. Платіжне доручення.exe 1752 TCP 212.227.15.158 587 ESTABLISHED
  106.  
  107. proc
  108. --------------
  109. C:\Users\operator\Desktop\Платіжне доручення.exe
  110. C:\Users\operator\Desktop\Платіжне доручення.exe
  111.  
  112. persist
  113. --------------
  114. n/a
  115.  
  116. drop
  117. --------------
  118. n/a
  119.  
  120. # # #
  121. https://www.virustotal.com/gui/file/c0b7cb8bb82ab3b25c87aaf5aee2679857c030bb216272dc49d2d3d157a9cc9d/details
  122. https://www.virustotal.com/gui/file/3dfa161fda2d67e9e1a2e90308a0bdc4ef9736b8f26152fd0264dd03591e66dd/details
  123. https://analyze.intezer.com/analyses/195a9005-58aa-4c4d-ad11-757597d8e9f8
  124.  
  125. https://www.unpac.me/results/dc6cf224-7085-4875-8773-195289d3016e
  126.  
  127. https://www.virustotal.com/gui/file/76d943b7ec3646eb97870f85001cae19a2cd552b72fb4dc00d354ce8715b80f9/details
  128. https://analyze.intezer.com/analyses/6ee98d18-9d85-49fa-b71c-076624798b66
  129. https://www.virustotal.com/gui/file/2c2fbae20d46eb124ff52f0894e82490e5e1c9f044d115a5fbc590d611bea6de/details
  130. https://analyze.intezer.com/analyses/86225281-c469-42a8-89f0-526359366616
  131. https://www.virustotal.com/gui/file/2b2bcf851c2b87033fd24c890c2a1de3642564f7cec7282982d96b8280baa849/details
  132. https://analyze.intezer.com/analyses/0f1c3fd7-1071-4c49-bae7-2a64488a366b
  133.  
  134. VR
  135.  
Add Comment
Please, Sign In to add comment