General

  • Target

    2024-12-12_3c886e525046ec4023362ab0a8a8a96e_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    241212-xhax4svqcm

  • MD5

    3c886e525046ec4023362ab0a8a8a96e

  • SHA1

    9b43610b5b28fd3b573f7bd9073dc84b913be909

  • SHA256

    205495309953cc878b28b5d5f9bc09d908ce8fc4170a98232c833d7c9687dc4f

  • SHA512

    e6edc038f89fbba272536021a38971203776148bcccaafb8b833ee5680541d57669fe3c1fb54c5178b9168be86811c3777ec5525b591be8cc13ac14f91385774

  • SSDEEP

    49152:sgvUDWv4e4uPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGdJS5Be:74e4uPpVW6gTVegO7DfEC+eb

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.andvo.ru:443/agent.ashx

Attributes
  • mesh_id

    0xC93CDE7423C55427714D263B0B0CC3176FDB334DFCA7F58A0B33765B64875A270EE2805A5E7F9E6194223A23EA8E9B47

  • server_id

    EDC986ED5C53E7CCCEE429DB2E65EFB490B25080611AD2B4555F70D7122ACA718915C496B90BBFEBCDFF7187ABDF2A07

  • wss

    wss://mesh.andvo.ru:443/agent.ashx

Targets

    • Target

      2024-12-12_3c886e525046ec4023362ab0a8a8a96e_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      3c886e525046ec4023362ab0a8a8a96e

    • SHA1

      9b43610b5b28fd3b573f7bd9073dc84b913be909

    • SHA256

      205495309953cc878b28b5d5f9bc09d908ce8fc4170a98232c833d7c9687dc4f

    • SHA512

      e6edc038f89fbba272536021a38971203776148bcccaafb8b833ee5680541d57669fe3c1fb54c5178b9168be86811c3777ec5525b591be8cc13ac14f91385774

    • SSDEEP

      49152:sgvUDWv4e4uPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGdJS5Be:74e4uPpVW6gTVegO7DfEC+eb

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks