General

  • Target

    2024-12-08_0cc17505f8938fb8ec77fa46cf6bc200_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    241208-w2ak1swngj

  • MD5

    0cc17505f8938fb8ec77fa46cf6bc200

  • SHA1

    68ec9e98f4b4879e3cdff972b43168e0c8450a18

  • SHA256

    a1992713c8ce8d9bac99271df380fc5be4300f3d32caaeedee7c9734c2837d83

  • SHA512

    fb1554df3c98edf1f51ea6ea6bad876aaa27341014f72b3aa60d9a760795e2c24160b1119ffbd1bfea6f3abcee04909aea759d78d35eeac37e0bffc6cf9b6359

  • SSDEEP

    49152:rgvUDWn4ewuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jz:M4ewuPpVm6gTVGQO7LfE0+e4

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.pchelper.ru:443/agent.ashx

Attributes
  • mesh_id

    0x43CCE4DD140774A1474B9BCCF100432C7AB1B31DAA58E3CB472C7055685FC704BBE67FFDA1C77B0FD931FABC6DC3D23B

  • server_id

    B9576B568DE61B6A40634A6BDFB57FC7ABBBE76BAECBAFF8752567A2B8130AF2E8D3AA8973BC0178454AADFDD748DF03

  • wss

    wss://mesh.pchelper.ru:443/agent.ashx

Targets

    • Target

      2024-12-08_0cc17505f8938fb8ec77fa46cf6bc200_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      0cc17505f8938fb8ec77fa46cf6bc200

    • SHA1

      68ec9e98f4b4879e3cdff972b43168e0c8450a18

    • SHA256

      a1992713c8ce8d9bac99271df380fc5be4300f3d32caaeedee7c9734c2837d83

    • SHA512

      fb1554df3c98edf1f51ea6ea6bad876aaa27341014f72b3aa60d9a760795e2c24160b1119ffbd1bfea6f3abcee04909aea759d78d35eeac37e0bffc6cf9b6359

    • SSDEEP

      49152:rgvUDWn4ewuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jz:M4ewuPpVm6gTVGQO7LfE0+e4

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks