General
-
Target
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe
-
Size
7.3MB
-
Sample
241115-dn4b3axmfw
-
MD5
9b249e4b53fb16c642841aff42d68fde
-
SHA1
b31ae5d3e28290977b10f19f5ecc24327ec923ec
-
SHA256
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6
-
SHA512
8d4331f3606593c322a84aa19b3e3d90f1475b8a083fd5674416e0e219682c2f1ed1335fbf670461e52ca2666600c0f4a2b2c3e45d32aedc0fd9c9e71ae172db
-
SSDEEP
49152:MPN7MVdt1L3BOS2K/pvitWTvrTbBj0HCnXSq1Xrb/T8vO90d7HjmAFd4A64nsfJ1:M9MyOhbnvXSq1f4w/5QRyNaiEp+e
Static task
static1
Behavioral task
behavioral1
Sample
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.computadoratualizacao.com:443/agent.ashx
-
mesh_id
0xE4C5BD59257F09AE8C52330D82C3B656958CD3F1AD16FEAAB44B924904275DBB46E2D02FD03AA032D8191A034178693D
-
server_id
E6F9C76A97DFF903A56FA89398495F9D0C7DCBE750534A7813430649338530AEA7B3D32773BC3F96B242A33F5DB33258
-
wss
wss://mesh.computadoratualizacao.com:443/agent.ashx
Targets
-
-
Target
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe
-
Size
7.3MB
-
MD5
9b249e4b53fb16c642841aff42d68fde
-
SHA1
b31ae5d3e28290977b10f19f5ecc24327ec923ec
-
SHA256
eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6
-
SHA512
8d4331f3606593c322a84aa19b3e3d90f1475b8a083fd5674416e0e219682c2f1ed1335fbf670461e52ca2666600c0f4a2b2c3e45d32aedc0fd9c9e71ae172db
-
SSDEEP
49152:MPN7MVdt1L3BOS2K/pvitWTvrTbBj0HCnXSq1Xrb/T8vO90d7HjmAFd4A64nsfJ1:M9MyOhbnvXSq1f4w/5QRyNaiEp+e
-
Detects MeshAgent payload
-
Meshagent family
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1