Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script
Tags
Common Information
Type | Value |
---|---|
UUID | 1cd4c383-9d6d-4447-803a-c2e897c1abb1 |
Fingerprint | be33a1f585b39f47 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | March 26, 2024, midnight |
Added to db | Oct. 15, 2024, 3:40 p.m. |
Last updated | Nov. 17, 2024, 6:56 p.m. |
Headline | Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script |
Title | Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script |
Detected Hints/Tags/Attributes | 82/4/9 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | File | 5 | martini.sys |
|
Details | File | 2 | c:\users\public\enc.exe |
|
Details | File | 2 | c:\users\public\pwndll.dll |
|
Details | MITRE ATT&CK Techniques | 333 | T1059.003 |
|
Details | MITRE ATT&CK Techniques | 59 | T1021.004 |
|
Details | MITRE ATT&CK Techniques | 118 | T1570 |
|
Details | MITRE ATT&CK Techniques | 472 | T1486 |
|
Details | MITRE ATT&CK Techniques | 48 | T1480 |
|
Details | MITRE ATT&CK Techniques | 30 | T1211 |