Agenda Ransomware Propagates to vCenters and ESXi via Custom Powershell Script ============================================================================================================================================================ [Files] [SHA256] [Detection name] [Details] 73b1fffd35d3a72775e0ac4c836e70efefa0930551a2f813843bdfb32df4579a Ransom.Win32.AGENDA.RY New Agenda binary e4cbee73bb41a3c7efc9b86a58495c5703f08d4b36df849c5bebc046d4681b70 Ransom.Win32.AGENDA.C New Agenda binary afe7b70b5d92a38fb222ec93c51b907b823a64daf56ef106523bc7acc1442e38 Ransom.Win32.AGENDA.YXECLT New Agenda binary dd50d1f39c851a3c1fce8abdf4ed84d7dca2b7bc19c1bc3c483c7fc3b8e9ab79 Embedded script used for propagation