General

  • Target

    2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    250125-qngvaawmcl

  • MD5

    4c63b362b73a36e9410738b9f81428ef

  • SHA1

    32824d470f193773e515870c9d3cf8dfa076b2a6

  • SHA256

    a9fcd874776f3f25782f85303cec11ac2c2e599d05e3d8a3ec3cb5e253bf7d12

  • SHA512

    17715f6600d44747bf22f4960256d33b4c3e6eb6192f24ad09207023870182b0c72a14851afb36d99f20e94ca646717a6fd9c7021b12a579a2585f06c0d02b64

  • SSDEEP

    49152:wRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMCF:b3wQuu81n256dgxtrE7+eGt

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.trmm.v-consulting.com:443/agent.ashx

Attributes
  • mesh_id

    0x79CC638C055FE100C59C9323FA6EBA3DC401BCC6B1C545978FD06AA55AE1B47307B41240C24A067C6BA18464D5E8CDF5

  • server_id

    0F065FD3EA3A2BA9B18DA11DE9E25D6F976A32944350A24CB834A6D1A6EAD7F86F0388FF89786D8F26B5DF45DC73EB03

  • wss

    wss://mesh.trmm.v-consulting.com:443/agent.ashx

Extracted

Language
ps1
Source
URLs
exe.dropper

https://github.com/rustdesk/rustdesk/releases/latest

exe.dropper

https://github.com/rustdesk/rustdesk/releases/download/$rustdesk_version/rustdesk-$rustdesk_version-x86_64.exe

Targets

    • Target

      2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      4c63b362b73a36e9410738b9f81428ef

    • SHA1

      32824d470f193773e515870c9d3cf8dfa076b2a6

    • SHA256

      a9fcd874776f3f25782f85303cec11ac2c2e599d05e3d8a3ec3cb5e253bf7d12

    • SHA512

      17715f6600d44747bf22f4960256d33b4c3e6eb6192f24ad09207023870182b0c72a14851afb36d99f20e94ca646717a6fd9c7021b12a579a2585f06c0d02b64

    • SSDEEP

      49152:wRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMCF:b3wQuu81n256dgxtrE7+eGt

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Modifies service settings

      Alters the configuration of existing services.

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks