General
-
Target
2025-03-07_38700b6ebb30b54827ce7d266dbe5791_ismagent_ryuk_sliver
-
Size
2.9MB
-
Sample
250307-ey9ghavky7
-
MD5
38700b6ebb30b54827ce7d266dbe5791
-
SHA1
14f3f6d8fab9e6cca292d97b50c0c1738c4105b5
-
SHA256
048c1d253ea91dac38e701c6fdcb083a3979681fd01e2b04c2a82fc0c9e4a988
-
SHA512
310d177a3842ef54b1cff6e751d889904d90c3382b43a1f1ef7424cea9dbc5444a653e2c390d297894760503df6d48cc5fcdb0619ced8d7bad71b76ed2a62a22
-
SSDEEP
49152:xZFIlmhRYg1OziGQGRCv6da/KMvxZdAMBwQoxXXujOl4MPMFvfldPSFrXxn3P:el7i86hR+fWMeP43P
Behavioral task
behavioral1
Sample
2025-03-07_38700b6ebb30b54827ce7d266dbe5791_ismagent_ryuk_sliver.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-07_38700b6ebb30b54827ce7d266dbe5791_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.evolan.us:443/agent.ashx
-
mesh_id
0x8F4DD982CA0E5619E60FD7174BFC8805724AF24D73BA969AEF628DD1541D7B61D77A44A7FB9C8502A25ED53BECAECA1C
-
server_id
4416B46D92A24DC210328C5179BFEEBDA756E4B03F67E69DCD1F4922A0090DAD385BBF4396DDA306329BF271DEC448BB
-
wss
wss://mesh.evolan.us:443/agent.ashx
Targets
-
-
Target
2025-03-07_38700b6ebb30b54827ce7d266dbe5791_ismagent_ryuk_sliver
-
Size
2.9MB
-
MD5
38700b6ebb30b54827ce7d266dbe5791
-
SHA1
14f3f6d8fab9e6cca292d97b50c0c1738c4105b5
-
SHA256
048c1d253ea91dac38e701c6fdcb083a3979681fd01e2b04c2a82fc0c9e4a988
-
SHA512
310d177a3842ef54b1cff6e751d889904d90c3382b43a1f1ef7424cea9dbc5444a653e2c390d297894760503df6d48cc5fcdb0619ced8d7bad71b76ed2a62a22
-
SSDEEP
49152:xZFIlmhRYg1OziGQGRCv6da/KMvxZdAMBwQoxXXujOl4MPMFvfldPSFrXxn3P:el7i86hR+fWMeP43P
-
Detects MeshAgent payload
-
Meshagent family
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1