MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02ec55a5a2ad775adccd333edd94ac0bd82129a233736f7240044e085b73b0b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MeshAgent


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 02ec55a5a2ad775adccd333edd94ac0bd82129a233736f7240044e085b73b0b3
SHA3-384 hash: 7b59ed443b66a4b3377f892ed811ad20a67cfb63645ab9e77cc55fff2ad5bae3ce7e8051b2c50adee98d55456e004ab9
SHA1 hash: 13e5fe6fedb20530b1a82733b35b3bc23e9c7b9a
MD5 hash: ce65c8134821032063d54ca07e8a73ae
humanhash: eighteen-west-dakota-cold
File name:Scan_docs#84768898.exe
Download: download sample
Signature MeshAgent
File size:5'743'368 bytes
First seen:2024-08-12 09:50:57 UTC
Last seen:2024-08-13 06:19:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash be41bf7b8cc010b614bd36bbca606973 (195 x LummaStealer, 126 x DanaBot, 63 x Vidar)
ssdeep 98304:C1kfl3MhgvWbkjpaKqPtUr0MHa35QvBq7E9ZYBtPsxcZE7sCC9:CufligvWIVJqr1p8Bq49ZetPApsCC
Threatray 2 similar samples on MalwareBazaar
TLSH T17E46332A7EE4A435C47756F83F759A075DE4A99206B0C42F4270C7C8E8606E633897FB
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon eaae8a9ea69ae8b0 (33 x Formbook, 4 x SnakeKeylogger, 1 x AgentTesla)
Reporter angel11VR
Tags:AnonVnc exe MeshAgent mimicSecretService signed

Code Signing Certificate

Organisation:Shenzhen Variable Engine E-commerce Co., Ltd.
Issuer:Certum Extended Validation Code Signing 2021 CA
Algorithm:sha256WithRSAEncryption
Valid from:2024-08-07T09:51:45Z
Valid to:2025-08-07T09:51:44Z
Serial number: 770d45805edacc32453aefed80f9bfad
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 176c727f52a6eb2c885bddba96bd2a15216afaa7fb6b906674a83acabce3a41e
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
4
# of downloads :
353
Origin country :
CZ CZ
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://gbshost.net/
Verdict:
No threats detected
Analysis date:
2024-08-12 07:53:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Encryption Static Stealth Trojan Heur
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a file in the Program Files subdirectories
Creating a file
Creating a process from a recently created file
Modifying a system file
Unauthorized injection to a recently created process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
installer lolbin microsoft_visual_cc overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.adwa.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Drops PE files to the startup folder
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Installs new ROOT certificates
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Malgent
Status:
Malicious
First seen:
2024-08-12 08:46:16 UTC
File Type:
PE (Exe)
Extracted files:
42
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
MD5 hash:
bf712f32249029466fa86756f5546950
SHA1 hash:
75ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SH256 hash:
4c4872202abb5a60a8764bf44b370578a2b3d6f449b3881e96cc38f1b55f9cda
MD5 hash:
6ab9f278a420ac86fc7ec85647ce99f1
SHA1 hash:
6ef604f5ed1ebe6dcafd038d43469bfffbc17b3c
SH256 hash:
416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
MD5 hash:
4ccc4a742d4423f2f0ed744fd9c81f63
SHA1 hash:
704f00a1acc327fd879cf75fc90d0b8f927c36bc
SH256 hash:
02ec55a5a2ad775adccd333edd94ac0bd82129a233736f7240044e085b73b0b3
MD5 hash:
ce65c8134821032063d54ca07e8a73ae
SHA1 hash:
13e5fe6fedb20530b1a82733b35b3bc23e9c7b9a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

MeshAgent

Executable exe 02ec55a5a2ad775adccd333edd94ac0bd82129a233736f7240044e085b73b0b3

(this sample)

  
Delivery method
Distributed via e-mail link

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments