Analysis

  • max time kernel
    121s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 02:44

General

  • Target

    2025-01-14_1e2795b296566026cc302c9ffb58dca3_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe

  • Size

    5.0MB

  • MD5

    1e2795b296566026cc302c9ffb58dca3

  • SHA1

    ea924d8052d3caabb8ed058c169e61fd49c2d134

  • SHA256

    8854df5ace9de254f297bc3a061922ec2f6549799f172e6f63cf98265a6306e9

  • SHA512

    b99804cb051cff9870d22a1bf023c81a377171d15a47af6c3a79277b7fe6030e533251475a1e37e498191614101813a5e8e902e8e300c0c21b282b31ab6b3eb5

  • SSDEEP

    49152:BRg0nHoi1euVvrb/T8vO90d7HjmAFd4A64nsfJ2l6OEchY4Vx9n5o/0IrwszVK5N:Ki1euVQE2f5aOszcGE3+e1D

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.ash-loc.fr:443/agent.ashx

Attributes
  • mesh_id

    0x595FF0B676E6172D1D16A0EBB2E57B3DC23D10D2F323007E387F1BE09C569A4798CC494357B321BFD8A8D638DAFC75BE

  • server_id

    4DA9F3E19D3D36A94CC345156B4A6E81D1EAB37125FC390B671AE3A5599E7C39D1B58AAA4E4FD30937188535209DC78E

  • wss

    wss://mesh.ash-loc.fr:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Blocklisted process makes network request 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-14_1e2795b296566026cc302c9ffb58dca3_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-14_1e2795b296566026cc302c9ffb58dca3_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe
      C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\is-787KD.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-787KD.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$8019C,3660179,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2804
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2036
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2928
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2636
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2892
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2724
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2496
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:856
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1992
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1832
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1424
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1240
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2692
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1316
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1472
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.ash-loc.fr --client-id 2 --site-id 2 --agent-type workstation --auth ed3496abf20aa4bc2ca9924a305b3514ead105c2c9e9b02ece53310b1e9c289b
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1804
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2176
      • C:\Program Files\Mesh Agent\MeshAgent.exe
        "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
        3⤵
        • Executes dropped EXE
        PID:2056
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2956
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:544
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:616
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:2248
    • C:\Program Files\Mesh Agent\MeshAgent.exe
      "C:\Program Files\Mesh Agent\MeshAgent.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:860
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
        • Modifies data under HKEY_USERS
        PID:2068
      • C:\Windows\system32\wbem\wmic.exe
        wmic os get oslanguage /FORMAT:LIST
        2⤵
          PID:900
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:1704
          • C:\Windows\System32\wbem\wmic.exe
            wmic SystemEnclosure get ChassisTypes
            2⤵
              PID:2816
            • C:\Windows\System32\wbem\wmic.exe
              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
              2⤵
                PID:2300
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Drops file in Program Files directory
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2928
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Drops file in Program Files directory
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2496
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Drops file in Program Files directory
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1744
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Drops file in Program Files directory
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1240
            • C:\Program Files\TacticalAgent\tacticalrmm.exe
              "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
              1⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2208
              • C:\Program Files\TacticalAgent\tacticalrmm.exe
                "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m checkrunner
                2⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2676
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2323042699.ps1
                  3⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:856
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\304182676.ps1 ASH-RMM
                  3⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2024
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\778042835.ps1
                  3⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3016
                  • C:\Windows\system32\manage-bde.exe
                    "C:\Windows\system32\manage-bde.exe" -protectors C: -get
                    4⤵
                      PID:1644
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2250557276.ps1
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3020
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\432428089.ps1
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2748
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\1602667645.ps1
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1320
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2148461621.ps1
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1640
                • C:\Program Files\Mesh Agent\MeshAgent.exe
                  "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
                  2⤵
                  • Executes dropped EXE
                  PID:2492
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\83996241.ps1
                  2⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:776

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Mesh Agent\MeshAgent.db

                Filesize

                153KB

                MD5

                d636fe9e6652c05e6964a9cbecc361b4

                SHA1

                f2c38e0edb74667e452dff6ed5a1690333175a0d

                SHA256

                956971b71624eeffb980500543a63260bbc2ecc5629f272d529b20f345f60129

                SHA512

                1cfd5c78ed20cad7a392b83e86e15b3dc732edec29d0d62ce0cc958f33f8ca18a4d192f8a3b7f71e655e4f96c502f2d53160cba51f56ffc61533403cad83e869

              • C:\Program Files\Mesh Agent\MeshAgent.msh

                Filesize

                31KB

                MD5

                b233a5a13752b103e29e412aa53f2781

                SHA1

                5f0d39008b761a3a38ebd1305e36419ecc7b55d7

                SHA256

                b2f1e1bf88366860d440a23c2be758f737e7ad8acb7db95e398fba22b9b81413

                SHA512

                641756a52ad90f28cc009ff69aedbcc8c9c207857a5f4057974a2cfb014fef39101686e67c1b5df11ace4ec87a32580c63a8da1ad89f184cccdcda4b0a06d55f

              • C:\Program Files\TacticalAgent\agent.log

                Filesize

                67B

                MD5

                6ac075d959b4d54145716e6933b45a45

                SHA1

                67dfb8186d5e47ce81df89105cd64a26ace59eb1

                SHA256

                c0f8c9a9e1b9ea8339806b7e3d5432b8b1a91ef4b30fc483c2d584fd6d4c386a

                SHA512

                89b4632752562d3251dd6ec849f6728ad7b78a9e3f53c8510990f9fc972ed852684c9f96f89eb8cfe2945c7eee295c5970e2b645712124fe731138f7528cb9e0

              • C:\ProgramData\TacticalRMM\1602667645.ps1

                Filesize

                746B

                MD5

                2ea52c938e935d6fa1f8298ff406d8f8

                SHA1

                f880c4c28fd9236946ac04f8e7d1d63764ba43b8

                SHA256

                a1fcfecd983de65e808a48f2a7c850c2c3915c65577045dba977dc59f3a1eaf1

                SHA512

                620b1e421bf9a5b0702c0f2c3d15e7f306277e5185fabb4ed15c58a7e8958aed90b8299f0eb3a935fe0b1161cdeb5a1541c242811bf96602fc1513ef76f80f16

              • C:\ProgramData\TacticalRMM\2148461621.ps1

                Filesize

                1KB

                MD5

                82f1a5f5e9ab6d62ad71aaa6f7702f0a

                SHA1

                924e61086777eb136f8aa8cf487e2c0846f7c9cd

                SHA256

                330f367407761e48a960f13993ea8ee249c04733983fe9fbd8e5547de46c343a

                SHA512

                c1f6c1d48994e1d3018ec072edb9373ffef54e106c739daaae4fc193380799625f22bd8b2ac7898dfdb9e425ed2fef3f27ddd839e22b07e7b2978a76ff130bfa

              • C:\ProgramData\TacticalRMM\2250557276.ps1

                Filesize

                212B

                MD5

                2a2a4fa718ed8aadf6554685dbb635a7

                SHA1

                0cad2a59f78b17ac6c4af98da719414ad68ab17e

                SHA256

                56d8800392b3d6b7c683ad58db5fe59057d1b9f7040acf2710cf19d4d1e3ec62

                SHA512

                fe44ce1ffb588e323d0520b9b8872219e9223aad8d9c36edde45bac1158ed48159b864319eea802ac62a06d276915f7944f0c2a6766c6e2c54df20ab51c4d1f3

              • C:\ProgramData\TacticalRMM\2323042699.ps1

                Filesize

                1022B

                MD5

                15670655991673b7ed8b90f6fbde3d01

                SHA1

                f7c90c06918193ff0f2abdcfef3e7f71e271ffab

                SHA256

                de9f7b64eb42a47248966e3cdc08bfdba3089e8c045a3665dc5d46750325bb38

                SHA512

                87da567f7cfe703cb18636137dc28a0f75647bc3981c89eae5ed49b6b7689ba377c692642045975314050020b505b4bdfe295eedaf38d87a92f52b65d4d5dad0

              • C:\ProgramData\TacticalRMM\304182676.ps1

                Filesize

                658B

                MD5

                6c26da7d49c6f0028e71eb68d51019fa

                SHA1

                80be311bdf4fde1eee1ad79ba177bd5ed163c9c1

                SHA256

                ae995200674fe8729f0c2f16b3a73514adcc17032325b8ee55a5b824eec60868

                SHA512

                1aa9c467225848040be9324d2cff5ea306eaf807cc12dde0f046af08c8e31fce43584bc33472efb536eaa328d0899b75bc3c41da2eb6da13bdabdef3e1cdfc65

              • C:\ProgramData\TacticalRMM\432428089.ps1

                Filesize

                5KB

                MD5

                82b56a47bead7e23055bf660fd727222

                SHA1

                a9d165d048aeca7a91f9f56ffee7acb63c4e0d2f

                SHA256

                6d1b661b6040793a76f672c860609e13fda47a6a86ee36692685da6a1ca2082d

                SHA512

                bb767adca8335bdaf8a67abf2bcc00a60f51ade4ec5d7187a22ee7e7c6421c8bcc9702f2ed9f4565315b29cd9a7e2ea0e0d783d2f1468ff6a170239d613ea5d9

              • C:\ProgramData\TacticalRMM\778042835.ps1

                Filesize

                681B

                MD5

                4014fda2d226576aa0993115dba68caf

                SHA1

                59101015b76a565c9aa490f64159d51fe3913eb1

                SHA256

                be810eaa94327ea612aa5359a5db829ffc10e8690b224f0dcf878e498d6cce5f

                SHA512

                99337774f145f00d9eb71f0d063bf9b831fe494090fdfe5d1adeda5210d55a0e64479fbd55ddf6ce01d42bea4e7b91a0bb62deb05de5daaf42d116d27649736f

              • C:\ProgramData\TacticalRMM\83996241.ps1

                Filesize

                35KB

                MD5

                e9fb33c49bee675e226d1afeef2740d9

                SHA1

                ded4e30152638c4e53db4c3c62a76fe0b69e60ab

                SHA256

                44e045ed5350758616d664c5af631e7f2cd10165f5bf2bd82cbf3a0bb8f63462

                SHA512

                2661a981d48d58c9ceb1992e55061ce07af0d53b5f38b07de620376e0ea1d876c7e50965e67aee80fe723968bdb956dc7fd93e7923608534c8fb4d21739dbc48

              • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe

                Filesize

                4.3MB

                MD5

                2f046950e65922336cd83bf0dbc9de33

                SHA1

                ddc64a8b21c8146c93c0b19c1eeb0ef784b980c6

                SHA256

                412e1f600251b21911c582e69381f677e663231f5e1d10786d88a026e00ea811

                SHA512

                a11cbf8b8b692d2d5a0e3af5a97f91a3d1f3e7aa39966eb7d62b3244b3913f2fdc21823d5c94de0d98e579f801709df44433af91567356361d5d9699a93b2cbc

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                Filesize

                914B

                MD5

                e4a68ac854ac5242460afd72481b2a44

                SHA1

                df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                SHA256

                cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                SHA512

                5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                70KB

                MD5

                49aebf8cbd62d92ac215b2923fb1b9f5

                SHA1

                1723be06719828dda65ad804298d0431f6aff976

                SHA256

                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                SHA512

                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                1KB

                MD5

                a266bb7dcc38a562631361bbf61dd11b

                SHA1

                3b1efd3a66ea28b16697394703a72ca340a05bd5

                SHA256

                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                SHA512

                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                Filesize

                252B

                MD5

                16ff7130fe8d49eac5095faea5d3610e

                SHA1

                28f9d236e4893af185d6d51ac8d84668fa35548b

                SHA256

                7e5c907f96b9496b746ba7be2d43f8da9562680037b4f130651332a688c0820b

                SHA512

                a046f7567028bbb05118b9a9e0c7d1b16fa29d4ef86476bf8c6cc9fe753307d8bd2c28823edfd574a3d7dbdd65c172ff1ea112d9815bffa54d0c63e889391ca2

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                38931ffb5e6c7c4f97e1413e617c34a3

                SHA1

                63dceea944434f16289e3e0b4070f2cf53f0634a

                SHA256

                0f9438c989eb86f4b2f1d83e271d21f48f95d78db7fb38b2ff461e0092f61b8a

                SHA512

                33ab484b6ae476967d40160bffb6ceeb0d83c567f28a656a52def82e480a286ca551b7b2676d423e2f87a179772b063a1539df2e1c60cd866124249cf8c7631b

              • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                242B

                MD5

                363f3bcde084f312622335c7e56d188a

                SHA1

                718d3fd02878b00e544471a90443d06830b0420d

                SHA256

                51f884e9d764c9de0468b6dff1efa10c4213c4861e29e656769bf5045acb6c1b

                SHA512

                fd9e141dc20a1e5847278aa983f5145c684fc7d9a90c0268b5497e350e2b6bcd5ce104603c253d535996d44b9ca8568c5b70e591f22e3f581d78a72cfeb2b117

              • C:\Windows\Temp\Cab1067.tmp

                Filesize

                29KB

                MD5

                d59a6b36c5a94916241a3ead50222b6f

                SHA1

                e274e9486d318c383bc4b9812844ba56f0cff3c6

                SHA256

                a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

                SHA512

                17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

              • C:\Windows\Temp\Tar12AF.tmp

                Filesize

                181KB

                MD5

                4ea6026cf93ec6338144661bf1202cd1

                SHA1

                a1dec9044f750ad887935a01430bf49322fbdcb7

                SHA256

                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                SHA512

                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

              • \Program Files\TacticalAgent\meshagent.exe

                Filesize

                3.3MB

                MD5

                44cbfd6ec32d5781718688f343b9d31f

                SHA1

                cefd4b47ae05a7bece5a7a58e7feabffc8200c98

                SHA256

                070a11b4cb7e3971f1670160e88abdbc3b7606598827eab5b67c75866c1abe89

                SHA512

                9de577250de9de22c6978e7d5216d35e74c7355d9efad60d7d8fa1dd9bf2622a1a5d903d04fb5310c9312866fd0e8dcf77372792cc5b977e638259a96ce799e3

              • \Program Files\TacticalAgent\tacticalrmm.exe

                Filesize

                9.2MB

                MD5

                bb383b7c3d5e4acb1001ab099b5b0f3c

                SHA1

                cb0c85f84a454aa4b1aab02bfba47c4355c2311e

                SHA256

                a6d3159c858aa3704f35d69b27829618ad0d1bae894c848a5233100c17464f95

                SHA512

                157dda96d1cacea55a6be27b9d432225b47d7334e664e577cef82a14c7eb1be1b8b84423b3905a4c1caecb5394be264d9b5c3e32109a4893e51a9d406ce740be

              • \Users\Admin\AppData\Local\Temp\is-787KD.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

                Filesize

                3.0MB

                MD5

                a639312111d278fee4f70299c134d620

                SHA1

                6144ca6e18a5444cdb9b633a6efee67aff931115

                SHA256

                4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

                SHA512

                f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

              • memory/1804-69-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1804-117-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1804-108-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1804-107-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1804-33-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1804-32-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1948-24-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1948-25-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1948-40-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2000-28-0x0000000000400000-0x0000000000712000-memory.dmp

                Filesize

                3.1MB

              • memory/2000-14-0x0000000000400000-0x0000000000712000-memory.dmp

                Filesize

                3.1MB

              • memory/2208-264-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2208-263-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2208-260-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2208-121-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2208-119-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2208-336-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/2404-29-0x0000000000400000-0x00000000004D7000-memory.dmp

                Filesize

                860KB

              • memory/2404-7-0x0000000000401000-0x00000000004B7000-memory.dmp

                Filesize

                728KB

              • memory/2404-4-0x0000000000400000-0x00000000004D7000-memory.dmp

                Filesize

                860KB

              • memory/2496-103-0x000000001B240000-0x000000001B522000-memory.dmp

                Filesize

                2.9MB

              • memory/2496-104-0x0000000001CC0000-0x0000000001CC8000-memory.dmp

                Filesize

                32KB

              • memory/2928-95-0x000000001B3B0000-0x000000001B692000-memory.dmp

                Filesize

                2.9MB

              • memory/2928-96-0x0000000001CB0000-0x0000000001CB8000-memory.dmp

                Filesize

                32KB