General
-
Target
2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch
-
Size
5.0MB
-
Sample
241213-qqp9fa1php
-
MD5
bf22789238729175476890e7567cafd4
-
SHA1
3eb1d3353648740fa38793698f4474d03288caca
-
SHA256
eeb235d716d933af293608f9a03bea2e5192b70d9817d0659b7a0f1843f90fb4
-
SHA512
afd302b90718815d8b2123507ea8b2ae5d56c476c1b766049488421c48e5f037ee7ce419b930fabcec55f33bccee99d9ddeac91024a4f1f2325e8dc24664f13c
-
SSDEEP
49152:SgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jf:V4eAuPpVm6gTVGQO77fEM+eg
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.iline.pro:443/agent.ashx
-
mesh_id
0x292B109256604ED7CAE1A1BCE7CE2A9FC9BE56489792BB0EDE5F4A15F5C33A8635085DE21F23A427A744D6D6C58E33AF
-
server_id
FDA3919C9844218611FEFA0E1F94C674C6DB04D936A2CDCE48D907D5A52A2926F2A1606BA653F07E372730476B6F24C9
-
wss
wss://mesh.iline.pro:443/agent.ashx
Targets
-
-
Target
2024-12-13_bf22789238729175476890e7567cafd4_frostygoop_luca-stealer_poet-rat_snatch
-
Size
5.0MB
-
MD5
bf22789238729175476890e7567cafd4
-
SHA1
3eb1d3353648740fa38793698f4474d03288caca
-
SHA256
eeb235d716d933af293608f9a03bea2e5192b70d9817d0659b7a0f1843f90fb4
-
SHA512
afd302b90718815d8b2123507ea8b2ae5d56c476c1b766049488421c48e5f037ee7ce419b930fabcec55f33bccee99d9ddeac91024a4f1f2325e8dc24664f13c
-
SSDEEP
49152:SgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5Jf:V4eAuPpVm6gTVGQO77fEM+eg
-
Detects MeshAgent payload
-
Meshagent family
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1