VRad

#agenttesla_250221

Feb 25th, 2021 (edited)
417
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.53 KB | None | 0 0
  1. #IOC #OptiData #VR #AgentTesla #AgentTeslaV3 #TGZ
  2.  
  3. https://pastebin.com/YCVjJ8A6
  4.  
  5. previous_contact:
  6. 10/02/21 https://pastebin.com/9JXvM5ix
  7. 07/12/20 https://pastebin.com/20AVUqZ6
  8. 04/12/20 https://pastebin.com/PYFMBfkg
  9. 15/06/20 https://pastebin.com/pma5MQAW
  10. 12/06/20 https://pastebin.com/SKNts0Es
  11. 29/10/19 https://pastebin.com/RinpBPvy
  12. 03/09/19 https://pastebin.com/zhJvDz8M
  13. 09/01/19 https://pastebin.com/MdDfZDdb
  14. 16/10/18 https://pastebin.com/d5DxTRrB
  15. 04/10/18 https://pastebin.com/JYShuXn4
  16. 11/10/18 https://pastebin.com/bkCSvJvM
  17.  
  18. FAQ:
  19.  
  20. attack_vector
  21. --------------
  22. email > URL to onedrive > TGZ > EXE > !delay 3 min! > exfil to smtp.1and1.es:587
  23.  
  24. email_headers
  25. --------------
  26. Received: from ns1.uzbektourism.uz (uzbektourism.uz [185.8.212.70])
  27. Received: from [127.0.0.1] (port=41628 helo=webmail.uzbektourism.uz)
  28. by ns1.uzbektourism.uz with esmtpa (Exim 4.92.3)
  29. (envelope-from <edo@uzbektourism.uz>)
  30. id 1lF6J3-0006bG-0c; Thu, 25 Feb 2021 07:23:09 +0500
  31. Date: Wed, 24 Feb 2021 21:23:08 -0500
  32. From: Denya Varchenko <edo@uzbektourism.uz>
  33. To: undisclosed-recipients:;
  34. Subject: Примітка щодо оплати від 25.02.2021
  35. Return-Path: <edo@uzbektourism.uz>
  36. User-Agent: Roundcube Webmail/1.4.9
  37. Message-ID: <588e4943ae9ad2a004835db4ef7e3a6d@uzbektourism.uz>
  38.  
  39. files
  40. --------------
  41. SHA-256 7726430ea25c3201f975b29a2ac6ae1fb71e840724623923091cd7dad4bcf9b3
  42. File name Примітка щодо оплати.tgz [ GZIP ]
  43. File size 396.84 KB (406368 bytes)
  44.  
  45. SHA-256 2de6c276a823e738998aba2b325fa8a30e8a1412f4aec6a6a3644402b74ee318
  46. File name Примітка щодо оплати.exe / InternalNameSpaceE.exe [ .NET executable ]
  47. File size 487.00 KB (498688 bytes)
  48.  
  49. unpacked from exe
  50. --------------
  51. SHA-256 e624003658c4f8b349f567c82229fd15d1e63d3d20fe6f7b4388403038cd2a44
  52. File name child1.bin [ .NET executable ]
  53. File size 10.00 KB (10240 bytes)
  54.  
  55.  
  56. activity
  57. **************
  58. PL_SCR https://onedrive.live.com/download?cid=52717AB489920A9B&resid=52717AB489920A9B%21119&authkey=AJhitQVVdzj3cl0
  59.  
  60. previous
  61. (25/02/21) https://onedrive.live.com/download?cid=44BBFEE50A375AFB&resid=44BBFEE50A375AFB!3900&authkey=AE3hRpZjTZyiajM
  62. (07/12/20) https://onedrive.live.com/download?cid=22B7C997915C7868&resid=22B7C997915C7868%21282&authkey=AIrAAExjvidyMqA
  63. (04/12/20) https://onedrive.live.com/download?cid=22B7C997915C7868&resid=22B7C997915C7868%21277&authkey=ANqq4raBmU8qCug
  64.  
  65. C2 212.227.15.158:587 [smtp.1and1.es]
  66.  
  67.  
  68. netwrk
  69. --------------
  70. 212.227.15.158 smtp.1and1.es Client Hello
  71.  
  72. comp
  73. --------------
  74. Примітка щодо оплати.exe 2692 TCP 212.227.15.158 587 ESTABLISHED
  75.  
  76. proc
  77. --------------
  78. C:\Users\operator\Desktop\Примітка щодо оплати.exe
  79. C:\Users\operator\Desktop\Примітка щодо оплати.exe
  80.  
  81. persist
  82. --------------
  83. n/a
  84.  
  85. drop
  86. --------------
  87. n/a
  88.  
  89. # # #
  90. https://www.virustotal.com/gui/file/7726430ea25c3201f975b29a2ac6ae1fb71e840724623923091cd7dad4bcf9b3/details
  91. https://www.virustotal.com/gui/file/2de6c276a823e738998aba2b325fa8a30e8a1412f4aec6a6a3644402b74ee318/details
  92. https://analyze.intezer.com/analyses/a5221c50-14a5-404d-9f9a-9d4b52ab490f
  93.  
  94. https://www.unpac.me/results/d4a36c02-ea34-49b0-b30e-96f2e84722bf
  95.  
  96. https://www.virustotal.com/gui/file/e624003658c4f8b349f567c82229fd15d1e63d3d20fe6f7b4388403038cd2a44/details
  97. https://analyze.intezer.com/analyses/a98643ef-2ad8-40f0-9e4c-88028304ecfd
  98.  
  99. VR
Add Comment
Please, Sign In to add comment