General

  • Target

    xdr.bat

  • Size

    4KB

  • Sample

    241024-v887gszann

  • MD5

    9e779d369e3ca17fdc894d13c4fd797a

  • SHA1

    bf7e34e0da33a587177e66cfcec51f3aa75b4a87

  • SHA256

    15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394

  • SHA512

    ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1

  • SSDEEP

    96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.yml

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/ngrok.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/x222.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/WindowsUpdate.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/auto-install-hrdp.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/hrdp.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/update.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.139.196.250/hrdp/autoupdate.zip

Extracted

Family

meshagent

Version

2

Botnet

hawlat

C2

http://45.139.196.71:443/agent.ashx

Attributes
  • mesh_id

    0x2C8478969E4CFA9513F19039B18062AD421F4DAF221C1152A30999ADFFCB13924EE4197808C0B50EB8A4890383CFE71E

  • server_id

    71C17FDD46B31764650F2D1D58C0308252130889EAD2CB51F652D3D44DDA6687355E5D788FD7CFD214D97F8E3D42DDAB

  • wss

    wss://45.139.196.71:443/agent.ashx

Targets

    • Target

      xdr.bat

    • Size

      4KB

    • MD5

      9e779d369e3ca17fdc894d13c4fd797a

    • SHA1

      bf7e34e0da33a587177e66cfcec51f3aa75b4a87

    • SHA256

      15dd389f66e269ea795710fa580b7e403d628f281c71ebf4d845dbc7d0bdf394

    • SHA512

      ab290641c94cd7d3270a236af9f1e849ea056fddcf3120afc3dbad61afd63453eca3732093799cc6b82f2275da74d374c453a324fa9e465d931d2dff71b351b1

    • SSDEEP

      96:IQ356afgPZCo/r+ab5iGp8HRI3h8UfpTsbUdGD:Iw56afgQHRq8UfGbdD

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Modifies Windows Defender Real-time Protection settings

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks