VRad

#Agenttesla_150620

Jun 15th, 2020
399
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.38 KB | None | 0 0
  1. #IOC #OptiData #VR #agenttesla #RAT #passwdstealer #FTP
  2.  
  3. https://pastebin.com/pma5MQAW
  4.  
  5. previous_contact:
  6. 12/06/20 https://pastebin.com/SKNts0Es
  7. 29/10/19 https://pastebin.com/RinpBPvy
  8. 03/09/19 https://pastebin.com/zhJvDz8M
  9. 09/01/19 https://pastebin.com/MdDfZDdb
  10. 16/10/18 https://pastebin.com/d5DxTRrB
  11. 04/10/18 https://pastebin.com/JYShuXn4
  12. 11/10/18 https://pastebin.com/bkCSvJvM
  13.  
  14. FAQ:
  15. https://radetskiy.wordpress.com/2018/10/19/ioc_agenttesla_111018/
  16.  
  17. attack_vector
  18. --------------
  19. email attach .png > URL link > 7zip > exe
  20.  
  21. email_headers
  22. --------------
  23. Received: from rin43152.imocstudio.com (rin43152.imocstudio.com [82.223.43.152])
  24. Received: from webmail.ferrallados.es (localhost.localdomain [127.0.0.1])
  25. Date: Mon, 15 Jun 2020 04:14:01 +0100
  26. From: Сьюзан Бойко <[email protected]>
  27. To: undisclosed-recipients:;
  28. Subject: Новий ордер на купівлю #15060012
  29. User-Agent: Roundcube Webmail/1.4.3
  30. Return-Path: [email protected]
  31.  
  32. files
  33. --------------
  34. SHA-256 0d1dbc780abe80489dd8661ab0d3de7f1915e0ea52d17705cbbac43921e420f1
  35. File name 15060012.7z [7-zip archive data, version 0.4]
  36. File size 237.17 KB (242858 bytes)
  37.  
  38. SHA-256 c0beca8181828e29cf435168b33e8d535f6a84be95e9f88b739867e7a4a1c11b
  39. File name 15060012.exe [ .NET executable ]
  40. File size 614.50 KB (629248 bytes)
  41.  
  42. SHA-256 978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
  43. File name AddInProcess32.exe [ .NET executable ]
  44. File size 41.09 KB (42080 bytes)
  45.  
  46. activity
  47. **************
  48. PL_SCR
  49. https://www.mediafire.com/file/c3pe7lverm3bpsp/15060012.7z/file
  50.  
  51.  
  52. C2
  53. 77.88.21.158:587 smtp.yandex{.} com
  54.  
  55. netwrk
  56. --------------
  57. 77.88.21.158 smtp.yandex.com
  58.  
  59. comp
  60. --------------
  61. AddInProcess32.exe 3268 TCP 77.88.21.158 587 ESTABLISHED
  62.  
  63. proc
  64. --------------
  65. C:\Users\operator\Desktop\15060012.exe
  66. C:\tmp\AddInProcess32.exe
  67.  
  68. persist
  69. --------------
  70. n/a
  71.  
  72. drop
  73. --------------
  74. C:\tmp\AddInProcess32.exe
  75.  
  76. # # #
  77. https://www.virustotal.com/gui/file/0d1dbc780abe80489dd8661ab0d3de7f1915e0ea52d17705cbbac43921e420f1/details
  78. https://www.virustotal.com/gui/file/c0beca8181828e29cf435168b33e8d535f6a84be95e9f88b739867e7a4a1c11b/details
  79. https://www.virustotal.com/gui/file/978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e/details
  80. https://analyze.intezer.com/#/analyses/8b154c71-5e67-4405-af7d-661a24b78383
  81.  
  82. VR
Add Comment
Please, Sign In to add comment