MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 99dd12257db55fc66cb9f292336f465ee4f132323c9478933e05fcc3fe22aea6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MeshAgent


Vendor detections: 16


Intelligence 16 IOCs YARA 7 File information Comments

SHA256 hash: 99dd12257db55fc66cb9f292336f465ee4f132323c9478933e05fcc3fe22aea6
SHA3-384 hash: 61c68664738c4a38c0abb9f02f67aee6d95cb9bf3b9211b233983a2d0ef4ca7190f79dd03debf4713faffa1d865af937
SHA1 hash: 2f81760d3a69d869be2c3b7752da1f8ca0b73873
MD5 hash: cc79e152064375661a8455b728905d2c
humanhash: carpet-washington-green-spaghetti
File name:file
Download: download sample
Signature MeshAgent
File size:2'051'334 bytes
First seen:2026-02-02 18:52:17 UTC
Last seen:2026-02-03 11:48:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c75a83e117d2bdfb2814c53e840c172 (4 x SalatStealer, 3 x QuasarRAT, 2 x XWorm)
ssdeep 49152:L2hvRhHukNED3NETRax4WwumTpJIungY4e6yHohQPLfT1Bwbl0:MvO7DdKRaCWwumTpJKYh6yHo6TfT1+0
TLSH T17A951219E7A409F8E1B3D179CD874906EB767C4907B1E6CF03A469A61F336A08E3D712
TrID 92.4% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10522/11/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.7% (.EXE) OS/2 Executable (generic) (2029/13)
0.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:dropped-by-gcleaner exe G MeshAgent US.file


Avatar
Bitsight
url: http://195.178.136.38/service

Intelligence


File Origin
# of uploads :
14
# of downloads :
108
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
SFX commands and extracted archive contents
Malware family:
n/a
ID:
1
File name:
_99dd12257db55fc66cb9f292336f465ee4f132323c9478933e05fcc3fe22aea6.exe
Verdict:
Malicious activity
Analysis date:
2026-02-02 19:07:58 UTC
Tags:
websocket meshagent rmm-tool

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
injection obfusc spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Creating a file in the system32 subdirectories
Connection attempt
Sending a custom TCP request
Launching a process
Creating a file in the Windows subdirectories
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-vm base64 cmd crypto fingerprint installer installer installer-heuristic keylogger lolbin microsoft_visual_cc overlay sfx
Verdict:
Adware
File Type:
exe x64
First seen:
2026-02-02T16:13:00Z UTC
Last seen:
2026-02-02T16:27:00Z UTC
Hits:
~10
Detections:
not-a-virus:HEUR:RemoteAdmin.Win32.MeshAgent.gen
Malware family:
MeshCentral Agent
Verdict:
Suspicious
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Verdict:
malicious
Label(s):
meshagent
Similar samples:
Result
Malware family:
meshagent
Score:
  10/10
Tags:
family:meshagent backdoor discovery persistence rat trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Sets service image path in registry
Detects MeshAgent payload
MeshAgent
Meshagent family
Unpacked files
SH256 hash:
99dd12257db55fc66cb9f292336f465ee4f132323c9478933e05fcc3fe22aea6
MD5 hash:
cc79e152064375661a8455b728905d2c
SHA1 hash:
2f81760d3a69d869be2c3b7752da1f8ca0b73873
SH256 hash:
2c10aee29cf945a9e1fef78c3349615df414d20ff6531a47530920bece6f176c
MD5 hash:
2ab01adf579ac9a49659b5788e501fbc
SHA1 hash:
93f61151c3883401c091aa2a468ec1ae3367b608
Detections:
INDICATOR_RMM_MeshAgent INDICATOR_RMM_MeshAgent_CERT
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

MeshAgent

Executable exe 99dd12257db55fc66cb9f292336f465ee4f132323c9478933e05fcc3fe22aea6

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments