General

  • Target

    2024-12-12_72bcc1351d9632429245952663a3e264_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    241212-x27fesvlbx

  • MD5

    72bcc1351d9632429245952663a3e264

  • SHA1

    33a30a436b62f3c34630240b156189324a01ec8e

  • SHA256

    6bbdfb603c2f1fa92efe6e09162ff7a8859d31b0547860f59547561ea80c4a8f

  • SHA512

    4b6698b6ce9615d4a9657d827f9a881a6f20ff899071bacfaad0c0de3002257f9c25727d8a8c46dd8a6055823d0bff0fed2d685e9e920f8215793fcb7d186f75

  • SSDEEP

    49152:jRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMC6:I3wQuu81n256dgxtrEn+eDP

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.rmm.xpertus-service.de:443/agent.ashx

Attributes
  • mesh_id

    0x9AB80AC2C10CC0E60A88AF1959FA7CFA5406C5C075E527EDBA76544D8295DD0A7203B0D6279BE93056216EAE6A484BB3

  • server_id

    62AEF12E4ED2E31BFAE22AF942C5E9BAC419D9BF1B2B4E41B75E0EF6EE6A542634EAC26B2CB1E2E9C1C7905767230610

  • wss

    wss://mesh.rmm.xpertus-service.de:443/agent.ashx

Targets

    • Target

      2024-12-12_72bcc1351d9632429245952663a3e264_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      72bcc1351d9632429245952663a3e264

    • SHA1

      33a30a436b62f3c34630240b156189324a01ec8e

    • SHA256

      6bbdfb603c2f1fa92efe6e09162ff7a8859d31b0547860f59547561ea80c4a8f

    • SHA512

      4b6698b6ce9615d4a9657d827f9a881a6f20ff899071bacfaad0c0de3002257f9c25727d8a8c46dd8a6055823d0bff0fed2d685e9e920f8215793fcb7d186f75

    • SSDEEP

      49152:jRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMC6:I3wQuu81n256dgxtrEn+eDP

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks