General
-
Target
trmm-testing-test-workstation-amd64.exe
-
Size
5.0MB
-
Sample
250116-xq46xsvnbn
-
MD5
5c5a5108d7b01b5dae1feeb2f1461336
-
SHA1
a144c90d755ddf78f699544f75a622e8502f2289
-
SHA256
3d550b8b386d201750d4c590e6a31c4a89fd9f409a7b8ee17541c9dd0227fb5a
-
SHA512
e51029943e1094e23b7824fd3290c72ae7d86d8414608214ee1c3128bada72bf575722fd2968abf6a3ade9dd578d374e8cc7914dd31a7f145b85120388d03824
-
SSDEEP
49152:fwHdjznTzM1AxDsrb/T8vO90d7HjmAFd4A64nsfJ4h6z81LMiGBK1AdVc3mYerz5:cTzM1AxhuoEV6mzNSTEB+eB
Static task
static1
Behavioral task
behavioral1
Sample
trmm-testing-test-workstation-amd64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
trmm-testing-test-workstation-amd64.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meshagent
2
TacticalRMM
http://mesh.kf637.tech:443/agent.ashx
-
mesh_id
0x027EE0A0A99EC9F223584C015748F9287DAD71E0172F49038454EBA30C1E818596038C0D789158EA51101068B1549D04
-
server_id
F1127B8E25531BA0F97A368EC0AF1FD444747B7FE7FEADE171C05E3063DF0E0BD0589D47759FF1DF8CA1D4B74C1E1C4C
-
wss
wss://mesh.kf637.tech:443/agent.ashx
Targets
-
-
Target
trmm-testing-test-workstation-amd64.exe
-
Size
5.0MB
-
MD5
5c5a5108d7b01b5dae1feeb2f1461336
-
SHA1
a144c90d755ddf78f699544f75a622e8502f2289
-
SHA256
3d550b8b386d201750d4c590e6a31c4a89fd9f409a7b8ee17541c9dd0227fb5a
-
SHA512
e51029943e1094e23b7824fd3290c72ae7d86d8414608214ee1c3128bada72bf575722fd2968abf6a3ade9dd578d374e8cc7914dd31a7f145b85120388d03824
-
SSDEEP
49152:fwHdjznTzM1AxDsrb/T8vO90d7HjmAFd4A64nsfJ4h6z81LMiGBK1AdVc3mYerz5:cTzM1AxhuoEV6mzNSTEB+eB
-
Detects MeshAgent payload
-
Meshagent family
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1