General
-
Target
2024-11-21_d79efbbb1d4d42b2ab2803d06f00e57a_frostygoop_luca-stealer_poet-rat_snatch
-
Size
5.0MB
-
Sample
241121-nyxblssjax
-
MD5
d79efbbb1d4d42b2ab2803d06f00e57a
-
SHA1
48761bee613727d3372deca5d7bd17cc6d9095c3
-
SHA256
904469f59647536a92e146e129a3be4229d9f1eba42cd76f5c60f55e00b68506
-
SHA512
69aa62c7fdd91db126a31f6d5c59207f39beca48a5948cd95d679a82664ddbec3643fe756b76a64f32382e74b29831f721c04d9760fc9145ed2ff38ee08c921b
-
SSDEEP
49152:iwHdjznTzM1AxDsrb/T8vO90d7HjmAFd4A64nsfJ4h6z81LMiGBK1AdVcvmYeTzm:FTzM1AxBuoEVyOzNSTEV+eC
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_d79efbbb1d4d42b2ab2803d06f00e57a_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-21_d79efbbb1d4d42b2ab2803d06f00e57a_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.newmicrostore.buzz:443/agent.ashx
-
mesh_id
0x25C412566C1173F4870034E82612E2AA7B6B0304029B35DB4FA03676285113C7F94AC259D324DADFBA11AB24421F9316
-
server_id
03E8D05041C7080E345371108C4CE967E8B82B91EBC10AA2D67A2E3FA28425D7D6E3E0B64571B3987AF0E5041036C3D0
-
wss
wss://mesh.newmicrostore.buzz:443/agent.ashx
Targets
-
-
Target
2024-11-21_d79efbbb1d4d42b2ab2803d06f00e57a_frostygoop_luca-stealer_poet-rat_snatch
-
Size
5.0MB
-
MD5
d79efbbb1d4d42b2ab2803d06f00e57a
-
SHA1
48761bee613727d3372deca5d7bd17cc6d9095c3
-
SHA256
904469f59647536a92e146e129a3be4229d9f1eba42cd76f5c60f55e00b68506
-
SHA512
69aa62c7fdd91db126a31f6d5c59207f39beca48a5948cd95d679a82664ddbec3643fe756b76a64f32382e74b29831f721c04d9760fc9145ed2ff38ee08c921b
-
SSDEEP
49152:iwHdjznTzM1AxDsrb/T8vO90d7HjmAFd4A64nsfJ4h6z81LMiGBK1AdVcvmYeTzm:FTzM1AxBuoEVyOzNSTEV+eC
-
Detects MeshAgent payload
-
Meshagent family
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1