General

  • Target

    start.hta

  • Size

    2KB

  • Sample

    250115-3l4x9aznev

  • MD5

    72f081c2a85a3b7ff6fdf4ec84223142

  • SHA1

    62b7fc52e1da16e69314f873e20db6f21135be8c

  • SHA256

    f6f4ab1036beaf92827bdfb23c1332990797515d8a5832c9671962376a24d74b

  • SHA512

    6ccb132bea970b4cdae18b42320770557025d05a05b2e5398392ab8de47595f07b50d42f1f2f03b1da258b7fe872d3432eef7aa04f90025596cda22acfa5308b

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

Work

C2

http://svc.domngn.com:443/agent.ashx

Attributes
  • mesh_id

    0x1402D1DD0CE9DF8279B292A95BF9D505208B4938710CC2F4024C18D802603325A0014D58AC0FAD4D7E9CEEAD748F7700

  • server_id

    405AB0FACF1D3A0959CD0B5B7A54BC2A4B9CD903A6DE863547BA797846F866038226A3EE9C97E847929FCAA70EDF8282

  • wss

    wss://svc.domngn.com:443/agent.ashx

Targets

    • Target

      start.hta

    • Size

      2KB

    • MD5

      72f081c2a85a3b7ff6fdf4ec84223142

    • SHA1

      62b7fc52e1da16e69314f873e20db6f21135be8c

    • SHA256

      f6f4ab1036beaf92827bdfb23c1332990797515d8a5832c9671962376a24d74b

    • SHA512

      6ccb132bea970b4cdae18b42320770557025d05a05b2e5398392ab8de47595f07b50d42f1f2f03b1da258b7fe872d3432eef7aa04f90025596cda22acfa5308b

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks