General
-
Target
VMware-viclient-f0c1e456.exe
-
Size
352.6MB
-
Sample
250101-1y6lhaxjat
-
MD5
4d038eee3d8223801b558874c2661717
-
SHA1
ff34e99ce2d3e194e7cdc9e1df437cbba336b36e
-
SHA256
1e383a0e7990c73ea2856ee1d0204f99728cd58f0b30a288e12081dc7cb3a8f1
-
SHA512
e9a897b2157ad8e67e48ffb28faac68e85dbd8307a308eda66b9b0b80d483ec70190895dc25981aa87f7b35160508bd6dcf432c58d26831b8b4993e1d69b1a81
-
SSDEEP
6291456:j0wIKbeufOczho93esOsFbIqh9dBL8r93/hgWa08ZSphZVzXVMZXGRAJSzhTOpFh:j2KbeoDhxsOfeR8r93HatQ/VLVMZXG27
Static task
static1
Behavioral task
behavioral1
Sample
VMware-viclient-f0c1e456.exe
Resource
win11-20241007-en
Malware Config
Extracted
meshagent
2
traffic-vc
http://162.254.38.170:443/agent.ashx
-
mesh_id
0xFA311D2F83B841F08B8AB48F5D2CE6C29D8454B1E03156158A557D0009BCFD55B4BC47EE76E7098D348EEAB8BF2114FC
-
server_id
14EDFD5700E9A14A8208348E4EFFE657FCAC524B4D43E6E5C4368E57344CD6EAB8EEE832B1FF53E8D20D44AACFE918CE
-
wss
wss://162.254.38.170:443/agent.ashx
Targets
-
-
Target
VMware-viclient-f0c1e456.exe
-
Size
352.6MB
-
MD5
4d038eee3d8223801b558874c2661717
-
SHA1
ff34e99ce2d3e194e7cdc9e1df437cbba336b36e
-
SHA256
1e383a0e7990c73ea2856ee1d0204f99728cd58f0b30a288e12081dc7cb3a8f1
-
SHA512
e9a897b2157ad8e67e48ffb28faac68e85dbd8307a308eda66b9b0b80d483ec70190895dc25981aa87f7b35160508bd6dcf432c58d26831b8b4993e1d69b1a81
-
SSDEEP
6291456:j0wIKbeufOczho93esOsFbIqh9dBL8r93/hgWa08ZSphZVzXVMZXGRAJSzhTOpFh:j2KbeoDhxsOfeR8r93HatQ/VLVMZXG27
-
Detects MeshAgent payload
-
Meshagent family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1