C:\MeshAgent\MeshAgent\Release\MeshService64.pdb
Behavioral task
behavioral1
Sample
2024-12-03_14b3ba84931f9d0d261decb8ccbaf079_ismagent_ryuk_sliver.exe
Resource
win7-20240903-en
General
-
Target
2024-12-03_14b3ba84931f9d0d261decb8ccbaf079_ismagent_ryuk_sliver
-
Size
2.9MB
-
MD5
14b3ba84931f9d0d261decb8ccbaf079
-
SHA1
a77659ab265213a2b38384b2ae8e1a722c1d7b2e
-
SHA256
854717a4571738e4ed8d49e7d1f9c77cf02f2aa26d7fd49cd4195b68aa44cb94
-
SHA512
97c65b9d2390b0e8af2a7a4510130a92c0be4c90399223b8f5b70eddc1b916329cb005fda7c3c5209c7d83a4c4637605a4cff37304960965e2a5af045d390b98
-
SSDEEP
49152:iiQagHg5EVhwQd+qrW+i1w+Tqc0KxZbDOCwMDbyeKw3FGMFvfjPW21I3iIJR:3g7hRdj9iMlHBSFBWZR
Malware Config
Extracted
meshagent
2
Personal
http://heimdall.hostedhero.com:443/agent.ashx
-
mesh_id
0x012DB6DDE7E65372F345CC35A1186B518B2A8BBA6502557EEDF03299CB0153F34D79A8C46FF331BD838E3903EF9E37A4
-
server_id
316B450D4320A8D7AF354D9F06DF347C98693E4AA9014FC7CFEF9940F3F338B0853FADD2076DF2D06D5810331C87BF50
-
wss
wss://heimdall.hostedhero.com:443/agent.ashx
Signatures
-
Detects MeshAgent payload 1 IoCs
Processes:
resource yara_rule sample family_meshagent -
Meshagent family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-12-03_14b3ba84931f9d0d261decb8ccbaf079_ismagent_ryuk_sliver
Files
-
2024-12-03_14b3ba84931f9d0d261decb8ccbaf079_ismagent_ryuk_sliver.exe windows:6 windows x64 arch:x64
f754045ac67ee24c42eeef8caebed961
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
dbghelp
MiniDumpWriteDump
SymFromAddr
StackWalk64
SymInitialize
SymFunctionTableAccess64
SymGetLineFromAddr64
SymGetModuleBase64
iphlpapi
GetAdaptersAddresses
SendARP
ConvertLengthToIpv4Mask
GetAdaptersInfo
ws2_32
send
getsockname
WSASocketW
recv
ioctlsocket
WSAGetLastError
ntohl
WSASetLastError
listen
closesocket
bind
accept
__WSAFDIsSet
setsockopt
socket
sendto
getsockopt
recvfrom
connect
shutdown
WSAIoctl
GetAddrInfoW
WSAResetEvent
WSAEventSelect
WSAStartup
WSACreateEvent
WSACloseEvent
select
ntohs
gethostname
htonl
htons
WSACleanup
FreeAddrInfoW
crypt32
CryptAcquireCertificatePrivateKey
CertAddEncodedCertificateToStore
CryptMsgClose
CryptMsgUpdate
CryptExportPublicKeyInfo
CertCreateSelfSignCertificate
CertFreeCertificateContext
CryptMsgOpenToEncode
CertAddCertificateContextToStore
PFXExportCertStore
CryptSignAndEncodeCertificate
CertCloseStore
CertStrToNameA
CryptMsgGetParam
CryptEncodeObject
CertSetCertificateContextProperty
CertFindCertificateInStore
CryptMsgCalculateEncodedLength
CertOpenStore
CertStrToNameW
CertGetCertificateContextProperty
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertDeleteCertificateFromStore
version
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoW
gdiplus
GdipGetImageEncoders
GdipCloneImage
GdiplusStartup
GdipAlloc
GdipDisposeImage
GdipFree
GdipGetImageEncodersSize
GdipSaveImageToStream
GdiplusShutdown
GdipLoadImageFromStream
ncrypt
NCryptFinalizeKey
BCryptOpenAlgorithmProvider
NCryptOpenStorageProvider
NCryptCreatePersistedKey
NCryptFreeObject
NCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptGenRandom
kernel32
RtlLookupFunctionEntry
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
GetFullPathNameW
GetStdHandle
WriteFile
LoadLibraryExA
GetModuleFileNameW
GetSystemPowerStatus
OpenProcess
MultiByteToWideChar
Sleep
GetLastError
CloseHandle
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
WideCharToMultiByte
WaitForSingleObject
GetCurrentThreadId
GetModuleHandleA
CreateThread
QueueUserAPC
OpenThread
ReadFile
LoadLibraryA
SleepEx
SetSystemPowerState
GetCurrentProcess
SetThreadExecutionState
HeapFree
HeapAlloc
GetProcessHeap
TlsGetValue
GetSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
ReleaseSemaphore
CreateSemaphoreA
CancelIo
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetFinalPathNameByHandleW
GetDriveTypeA
SetFilePointer
FindFirstVolumeA
FindClose
CreateFileW
GetVolumePathNamesForVolumeNameA
GetFileAttributesExW
ReadDirectoryChangesW
FindNextVolumeA
FindVolumeClose
GetDiskFreeSpaceExA
CreateEventA
GetModuleHandleExA
WaitForMultipleObjectsEx
CreateNamedPipeA
DisconnectNamedPipe
CreateFileA
CancelIoEx
LocalFree
ConnectNamedPipe
SetConsoleOutputCP
IsDebuggerPresent
GetTempPathW
CancelSynchronousIo
SetEvent
RtlVirtualUnwind
ResetEvent
GetThreadId
SetEnvironmentVariableA
GetCurrentProcessId
GetEnvironmentStrings
FreeEnvironmentStringsA
CopyFileW
RtlCaptureContext
SuspendThread
ResumeThread
DuplicateHandle
GetTickCount64
GetCurrentThread
GetOverlappedResult
GetThreadContext
TerminateProcess
WTSGetActiveConsoleSessionId
GetExitCodeProcess
SetEndOfFile
DeleteFileW
SetFilePointerEx
SetConsoleCtrlHandler
FreeConsole
SetLastError
GetFileType
EncodePointer
SwitchToFiber
DeleteFiber
CreateFiber
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateDirectoryW
GetConsoleCP
MoveFileExW
SetEnvironmentVariableW
GetTimeZoneInformation
SetStdHandle
GetDriveTypeW
PeekNamedPipe
GetCommandLineA
GetCommandLineW
GetACP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetStringTypeW
HeapReAlloc
FlushFileBuffers
WriteConsoleW
GetCPInfo
FindFirstFileExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
InitializeSListHead
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
HeapSize
RtlPcToFileHeader
SystemTimeToFileTime
GetModuleHandleW
user32
GetWindowPlacement
ShowWindow
SetWindowPlacement
SetWindowTextA
GetDlgItem
DialogBoxParamW
EnableWindow
MessageBeep
ExitWindowsEx
GetUserObjectInformationA
EnumDisplayMonitors
GetSystemMetrics
SetThreadDesktop
GetThreadDesktop
CloseDesktop
GetMonitorInfoA
OpenInputDesktop
GetMessageA
GetMessageExtraInfo
GetProcessWindowStation
SetWindowTextW
DestroyWindow
GetDC
PostMessageA
GetIconInfo
GetCursorInfo
MapVirtualKeyA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
UnregisterClassA
DrawIconEx
SetWinEventHook
RegisterClassExA
UnhookWinEvent
SetForegroundWindow
ReleaseDC
SendInput
SetProcessDPIAware
GetUserObjectInformationW
LoadCursorA
EndDialog
MessageBoxW
DispatchMessageA
gdi32
CreateCompatibleBitmap
BitBlt
StretchBlt
DeleteDC
GetObjectA
DeleteObject
GetDIBits
CreateCompatibleDC
SelectObject
SetStretchBltMode
advapi32
StartServiceCtrlDispatcherA
CryptGetProvParam
CryptSetHashParam
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
RegDeleteValueA
RegCreateKeyW
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
OpenProcessToken
InitiateSystemShutdownA
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptReleaseContext
RegSetValueExW
CryptDestroyKey
InitializeSecurityDescriptor
SetEntriesInAclA
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
SetTokenInformation
OpenServiceA
CheckTokenMembership
FreeSid
StartServiceA
ControlService
RegisterServiceCtrlHandlerExA
OpenSCManagerA
SetServiceStatus
AllocateAndInitializeSid
CloseServiceHandle
QueryServiceStatus
CryptAcquireContextW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptGetUserKey
shell32
ShellExecuteExW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
oleaut32
SysStringLen
SysFreeString
SysAllocString
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 792KB - Virtual size: 792KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ