General

  • Target

    2024-11-19_f71c1b063c2c539f8887b7a5b26cebe9_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    241119-qz7j3swfra

  • MD5

    f71c1b063c2c539f8887b7a5b26cebe9

  • SHA1

    cc576be4f5421fe7b9df0f52a1ab2857af2e10c3

  • SHA256

    9969eceba4b813f88bf217e4277339cc82395d3794c7a3365e45197abcbda43d

  • SHA512

    5f1f3be85f55630ccb27213d70a1b302b0b20cb786ea8a39b2a3571c5be525ffdc7f59ed9349d5b147b40c6f9bd1d4e5abb9f154c3ce17f57c3ef0e503756e74

  • SSDEEP

    49152:WgnMTzHN+QelVlwrb/T8vO90d7HjmAFd4A64nsfJhi9Otrzb4Xe1FQc1E/8X7Zu2:YN+QelVOXpV16UupmhE5+es

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.rmmlot.ru:443/agent.ashx

Attributes
  • mesh_id

    0x07F75C618491FDD85DE51F5C0F311F5A9743BCB16BBC7685DB2D3B4B4283EA4FF8C8E1CFF8BEE29C4F7ABFDDB21FF4F3

  • server_id

    E2A078A17A87828CBD5E4E7C30F987160C3400BA0B6A8D555539E5E10173389037B8F4A097ADBB7249567E93D80E71F4

  • wss

    wss://mesh.rmmlot.ru:443/agent.ashx

Targets

    • Target

      2024-11-19_f71c1b063c2c539f8887b7a5b26cebe9_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      f71c1b063c2c539f8887b7a5b26cebe9

    • SHA1

      cc576be4f5421fe7b9df0f52a1ab2857af2e10c3

    • SHA256

      9969eceba4b813f88bf217e4277339cc82395d3794c7a3365e45197abcbda43d

    • SHA512

      5f1f3be85f55630ccb27213d70a1b302b0b20cb786ea8a39b2a3571c5be525ffdc7f59ed9349d5b147b40c6f9bd1d4e5abb9f154c3ce17f57c3ef0e503756e74

    • SSDEEP

      49152:WgnMTzHN+QelVlwrb/T8vO90d7HjmAFd4A64nsfJhi9Otrzb4Xe1FQc1E/8X7Zu2:YN+QelVOXpV16UupmhE5+es

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks