General

  • Target

    eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe

  • Size

    7.3MB

  • Sample

    241115-dn4b3axmfw

  • MD5

    9b249e4b53fb16c642841aff42d68fde

  • SHA1

    b31ae5d3e28290977b10f19f5ecc24327ec923ec

  • SHA256

    eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6

  • SHA512

    8d4331f3606593c322a84aa19b3e3d90f1475b8a083fd5674416e0e219682c2f1ed1335fbf670461e52ca2666600c0f4a2b2c3e45d32aedc0fd9c9e71ae172db

  • SSDEEP

    49152:MPN7MVdt1L3BOS2K/pvitWTvrTbBj0HCnXSq1Xrb/T8vO90d7HjmAFd4A64nsfJ1:M9MyOhbnvXSq1f4w/5QRyNaiEp+e

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.computadoratualizacao.com:443/agent.ashx

Attributes
  • mesh_id

    0xE4C5BD59257F09AE8C52330D82C3B656958CD3F1AD16FEAAB44B924904275DBB46E2D02FD03AA032D8191A034178693D

  • server_id

    E6F9C76A97DFF903A56FA89398495F9D0C7DCBE750534A7813430649338530AEA7B3D32773BC3F96B242A33F5DB33258

  • wss

    wss://mesh.computadoratualizacao.com:443/agent.ashx

Targets

    • Target

      eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6.exe

    • Size

      7.3MB

    • MD5

      9b249e4b53fb16c642841aff42d68fde

    • SHA1

      b31ae5d3e28290977b10f19f5ecc24327ec923ec

    • SHA256

      eebf6441a428a89d4185087efcc00c8382d6b6c1d2c27cce2307049ccf0c7fb6

    • SHA512

      8d4331f3606593c322a84aa19b3e3d90f1475b8a083fd5674416e0e219682c2f1ed1335fbf670461e52ca2666600c0f4a2b2c3e45d32aedc0fd9c9e71ae172db

    • SSDEEP

      49152:MPN7MVdt1L3BOS2K/pvitWTvrTbBj0HCnXSq1Xrb/T8vO90d7HjmAFd4A64nsfJ1:M9MyOhbnvXSq1f4w/5QRyNaiEp+e

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks