General

  • Target

    2025-01-23_9f36830d3f867d37d3edd55800ef1677_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    250123-wjdjyszjcp

  • MD5

    9f36830d3f867d37d3edd55800ef1677

  • SHA1

    1d7a79e3a08ce71954416c2cd09ae3c01af082d0

  • SHA256

    16c3ce54c980ffb165d60fb3e4b35e4d5f0c8b8624715f07d11cf460d58e4eb6

  • SHA512

    ee9978bbcf20e6c873a692a1c2d9d2ecf8e95c044c60731d9f4805692718091fd0b84cf88dda436fd9b9e7eab25c1f6c54ec72894cc4840d1744554006e917a8

  • SSDEEP

    49152:cRg0nHQi1uuVvrb/T8vO90d7HjmAFd4A64nsfJWl6OEch34Vx9n5ov0IrQszVS5n:Xi1uuVQEpf5qusz8GEn+eAI

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.anyhourgroup.com:443/agent.ashx

Attributes
  • mesh_id

    0x3131CC9705ECDCAD5F1EE47ACE7CAD84F8394DBDFFAEB8E3F5C6440C0CB3FFB2E414D885804144F409EB30B05825A7AE

  • server_id

    C8502FFE2B2CAFF1B88B2A8F6433FD9A17EBF79022C9F02F7132AFDADABDA021D5B8CD8BD7C80BA24141837BBB70734E

  • wss

    wss://mesh.anyhourgroup.com:443/agent.ashx

Targets

    • Target

      2025-01-23_9f36830d3f867d37d3edd55800ef1677_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      9f36830d3f867d37d3edd55800ef1677

    • SHA1

      1d7a79e3a08ce71954416c2cd09ae3c01af082d0

    • SHA256

      16c3ce54c980ffb165d60fb3e4b35e4d5f0c8b8624715f07d11cf460d58e4eb6

    • SHA512

      ee9978bbcf20e6c873a692a1c2d9d2ecf8e95c044c60731d9f4805692718091fd0b84cf88dda436fd9b9e7eab25c1f6c54ec72894cc4840d1744554006e917a8

    • SSDEEP

      49152:cRg0nHQi1uuVvrb/T8vO90d7HjmAFd4A64nsfJWl6OEch34Vx9n5ov0IrQszVS5n:Xi1uuVQEpf5qusz8GEn+eAI

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks