General

  • Target

    2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    241213-qqp9fa1php

  • MD5

    bf22789238729175476890e7567cafd4

  • SHA1

    3eb1d3353648740fa38793698f4474d03288caca

  • SHA256

    eeb235d716d933af293608f9a03bea2e5192b70d9817d0659b7a0f1843f90fb4

  • SHA512

    afd302b90718815d8b2123507ea8b2ae5d56c476c1b766049488421c48e5f037ee7ce419b930fabcec55f33bccee99d9ddeac91024a4f1f2325e8dc24664f13c

  • SSDEEP

    49152:SgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jf:V4eAuPpVm6gTVGQO77fEM+eg

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.iline.pro:443/agent.ashx

Attributes
  • mesh_id

    0x292B109256604ED7CAE1A1BCE7CE2A9FC9BE56489792BB0EDE5F4A15F5C33A8635085DE21F23A427A744D6D6C58E33AF

  • server_id

    FDA3919C9844218611FEFA0E1F94C674C6DB04D936A2CDCE48D907D5A52A2926F2A1606BA653F07E372730476B6F24C9

  • wss

    wss://mesh.iline.pro:443/agent.ashx

Targets

    • Target

      2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      bf22789238729175476890e7567cafd4

    • SHA1

      3eb1d3353648740fa38793698f4474d03288caca

    • SHA256

      eeb235d716d933af293608f9a03bea2e5192b70d9817d0659b7a0f1843f90fb4

    • SHA512

      afd302b90718815d8b2123507ea8b2ae5d56c476c1b766049488421c48e5f037ee7ce419b930fabcec55f33bccee99d9ddeac91024a4f1f2325e8dc24664f13c

    • SSDEEP

      49152:SgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jf:V4eAuPpVm6gTVGQO77fEM+eg

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks