Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 13:24

General

  • Target

    2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe

  • Size

    5.0MB

  • MD5

    4c63b362b73a36e9410738b9f81428ef

  • SHA1

    32824d470f193773e515870c9d3cf8dfa076b2a6

  • SHA256

    a9fcd874776f3f25782f85303cec11ac2c2e599d05e3d8a3ec3cb5e253bf7d12

  • SHA512

    17715f6600d44747bf22f4960256d33b4c3e6eb6192f24ad09207023870182b0c72a14851afb36d99f20e94ca646717a6fd9c7021b12a579a2585f06c0d02b64

  • SSDEEP

    49152:wRg0nHs3wQuuhrb/T8vO90d7HjmAFd4A64nsfJoRLvXW4uyRcH5g3ZCNUgxocMCF:b3wQuu81n256dgxtrE7+eGt

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.trmm.v-consulting.com:443/agent.ashx

Attributes
  • mesh_id

    0x79CC638C055FE100C59C9323FA6EBA3DC401BCC6B1C545978FD06AA55AE1B47307B41240C24A067C6BA18464D5E8CDF5

  • server_id

    0F065FD3EA3A2BA9B18DA11DE9E25D6F976A32944350A24CB834A6D1A6EAD7F86F0388FF89786D8F26B5DF45DC73EB03

  • wss

    wss://mesh.trmm.v-consulting.com:443/agent.ashx

Extracted

Language
ps1
Source
URLs
exe.dropper

https://github.com/rustdesk/rustdesk/releases/latest

exe.dropper

https://github.com/rustdesk/rustdesk/releases/download/$rustdesk_version/rustdesk-$rustdesk_version-x86_64.exe

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Blocklisted process makes network request 6 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Power Settings 1 TTPs 1 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_4c63b362b73a36e9410738b9f81428ef_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe
      C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Users\Admin\AppData\Local\Temp\is-STNN0.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-STNN0.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$80158,3660179,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2864
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2848
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2304
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2836
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2632
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2772
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2680
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:3020
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1104
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2508
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2024
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2356
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1584
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2156
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.trmm.v-consulting.com --client-id 6 --site-id 9 --agent-type workstation --auth 5b9472796a1c23bdaf91ebdad8ab4b0ce080e83f3199cdd50bb816e3fa1ddd1e
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2784
      • C:\Program Files\Mesh Agent\MeshAgent.exe
        "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
        3⤵
        • Executes dropped EXE
        PID:912
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1620
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2700
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:2096
    • C:\Program Files\Mesh Agent\MeshAgent.exe
      "C:\Program Files\Mesh Agent\MeshAgent.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2284
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:884
        • C:\Windows\system32\wbem\wmic.exe
          wmic os get oslanguage /FORMAT:LIST
          2⤵
            PID:1600
          • C:\Windows\System32\wbem\wmic.exe
            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
            2⤵
              PID:2324
            • C:\Windows\System32\wbem\wmic.exe
              wmic SystemEnclosure get ChassisTypes
              2⤵
                PID:2756
              • C:\Windows\System32\wbem\wmic.exe
                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                2⤵
                  PID:2760
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -noprofile -nologo -command -
                  2⤵
                  • Drops file in Program Files directory
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2676
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -noprofile -nologo -command -
                  2⤵
                  • Drops file in Program Files directory
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1104
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -noprofile -nologo -command -
                  2⤵
                  • Drops file in Program Files directory
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1712
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -noprofile -nologo -command -
                  2⤵
                  • Drops file in Program Files directory
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1932
              • C:\Program Files\TacticalAgent\tacticalrmm.exe
                "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                PID:772
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m checkrunner
                  2⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2640
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\3846449057.ps1
                    3⤵
                    • Drops file in System32 directory
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2724
                • C:\Program Files\Mesh Agent\MeshAgent.exe
                  "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
                  2⤵
                  • Executes dropped EXE
                  PID:1720
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\3090847037.ps1
                  2⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1752
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {C85151C5-262D-4315-BFD7-2EFCBF3E651E} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                  PID:2724
                  • C:\Program Files\TacticalAgent\tacticalrmm.exe
                    "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 8
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2388
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\3871614904.ps1
                      3⤵
                      • Drops file in Program Files directory
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2392
                  • C:\Program Files\TacticalAgent\tacticalrmm.exe
                    "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 6
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2940
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\2058954537.ps1
                      3⤵
                      • Blocklisted process makes network request
                      • Drops file in Program Files directory
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3008
                      • C:\Windows\system32\net.exe
                        "C:\Windows\system32\net.exe" stop rustdesk
                        4⤵
                          PID:1624
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop rustdesk
                            5⤵
                              PID:2476
                      • C:\Program Files\TacticalAgent\tacticalrmm.exe
                        "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 47
                        2⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2140
                      • C:\Program Files\TacticalAgent\tacticalrmm.exe
                        "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 60
                        2⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2364
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\639238980.ps1
                          3⤵
                          • Drops file in Program Files directory
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1768
                      • C:\Program Files\TacticalAgent\tacticalrmm.exe
                        "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 30
                        2⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1932
                        • C:\Windows\system32\cmd.exe
                          cmd /c C:\ProgramData\TacticalRMM\2519378227.bat
                          3⤵
                            PID:2012
                            • C:\Windows\system32\powercfg.exe
                              powercfg.exe -x -standby-timeout-ac 0
                              4⤵
                              • Power Settings
                              PID:916
                        • C:\Program Files\TacticalAgent\tacticalrmm.exe
                          "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m taskrunner -p 39
                          2⤵
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1452
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -NoProfile -ExecutionPolicy Bypass C:\ProgramData\TacticalRMM\619376817.ps1
                            3⤵
                            • Drops file in Program Files directory
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2996

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files\Mesh Agent\MeshAgent.db

                        Filesize

                        35KB

                        MD5

                        e0500b210f9c35c0d1b8ae4be3782939

                        SHA1

                        3e9b8a5967b9f1ca0450c5f8cb03e52d43ef8cde

                        SHA256

                        d5981e57b568d85513edcf4d4fa4234a932c837d194c66bb580da38d1a2210b9

                        SHA512

                        514cf59dd757a2c700fd5be66d585f2d52dca7f94a420a340b7313b832e91a609e8d769d5976cebd7db4671d35faab4e7a22bce607918ff9d998813e5dafe336

                      • C:\Program Files\Mesh Agent\MeshAgent.db

                        Filesize

                        153KB

                        MD5

                        474edbd6fc82305c22551c2ee2704f55

                        SHA1

                        dd4c9e28b997b95ee9dc067d0a3a48059e2acc3c

                        SHA256

                        13043b646a518ee1686d7896c981df24d21b6d772b2a0a44691a4637bfa7826b

                        SHA512

                        f1822bf453951937e254cebff0f997a4b8a49c65c3bb2eea25a836f18d0c288e418cbd24ffb66ad82b7a4b3b640482436ffcba38c1d2b86ccb0bb318359d3efe

                      • C:\Program Files\Mesh Agent\MeshAgent.msh

                        Filesize

                        31KB

                        MD5

                        3def9ce05b48a96a5afbdea36aea0a4b

                        SHA1

                        75a0e960b1af485137301ee6021a54efa27bcf25

                        SHA256

                        6e9dd1a8e0181e570075f804d62da79e55da9d3d6ef6242a0ad6fab5b4178ce5

                        SHA512

                        657ca5d77dbf9536fa06a13ea2341eeb5d0da0645c0e4b00005b51f1d8994d3188f44fc38563bdb4d219f08e22d57330391f9c5ee261aa7b51d2c31fab728773

                      • C:\Program Files\TacticalAgent\agent.log

                        Filesize

                        67B

                        MD5

                        6dd349bf47a21d588b20bfb3fd8f63b7

                        SHA1

                        9cd070e20729a73ba3e222296f30c4196ad504cb

                        SHA256

                        5fa4b707ebd1eaef55062f19e9b85a60cd66bdce3af35dd36bffdc18a87e6e1e

                        SHA512

                        9181ec85d3e5db1802b6db244ce2763f2ebb76d64436128897b704a29a623ee83a9305edaf42942502d6eec9bbdf01ef3efa1a099873a9d422fac8dbce4c5980

                      • C:\Program Files\TacticalAgent\agent.log

                        Filesize

                        308B

                        MD5

                        01ef3ebd474d825294dbcb4cc36da6fd

                        SHA1

                        b4118861f5edbf42385a62c34021b17458d8454a

                        SHA256

                        b2a25a0608b1ed490fb8342de7e5806a0d045f5f470539493c729f28a1772b96

                        SHA512

                        65fdd38375330ea99ae73861c50d5666e846f5c977ff5b9ba42a3da650081be7e0ea5d8630b4f8f08307718e37cdb11bdc6db0f69912ae1b1f7ed29303e2fa37

                      • C:\ProgramData\TacticalRMM\2058954537.ps1

                        Filesize

                        4KB

                        MD5

                        4e75b4a107fbbaa58b8e658101b49114

                        SHA1

                        73c6d983dbb4287bc1868dcd70b3e8e5708d871a

                        SHA256

                        955e58a32809121f5d651e0b99248360721fdee4105e3e91a5a0d020257a562e

                        SHA512

                        fa8710a06b9c1cbb1932fbc487e44e9ad42d663a542f9b17d3ea517577b573cff633e343d3a39f96824610a3d38a8e2292fdefa4e823c1df34877b39459b6459

                      • C:\ProgramData\TacticalRMM\2519378227.bat

                        Filesize

                        37B

                        MD5

                        29b672000c75e84cd3985d3d2f89e26d

                        SHA1

                        7c7ac7747dcd4a96a9faa5ae67fdd4d8b524ba8f

                        SHA256

                        aa93ae6cfcc842f1f00f2a18538f5702a4c709e6ff183cf72437489dd19ca99b

                        SHA512

                        02501cded7f45da19d282f7ad9562208849ad5f56b60e234c2e60c932951ceb21f30f1b0668ddad1348122a85d823b9b175f587208b4fb6ba68fcc25e2b90fe4

                      • C:\ProgramData\TacticalRMM\3090847037.ps1

                        Filesize

                        35KB

                        MD5

                        e9fb33c49bee675e226d1afeef2740d9

                        SHA1

                        ded4e30152638c4e53db4c3c62a76fe0b69e60ab

                        SHA256

                        44e045ed5350758616d664c5af631e7f2cd10165f5bf2bd82cbf3a0bb8f63462

                        SHA512

                        2661a981d48d58c9ceb1992e55061ce07af0d53b5f38b07de620376e0ea1d876c7e50965e67aee80fe723968bdb956dc7fd93e7923608534c8fb4d21739dbc48

                      • C:\ProgramData\TacticalRMM\3846449057.ps1

                        Filesize

                        1KB

                        MD5

                        765419c7c4016b7abfe7e214a4fac90d

                        SHA1

                        347439e58bf38bf0bf32f1de93e51d209344641f

                        SHA256

                        ffe10c724b7bacf68c161f830d5f698ec51c9cf6d5a0805481eb440583001b6e

                        SHA512

                        daefd8a58e29ebd0b4eb9566ec16cf0c4de10e1ad01348a4c0ed8bf47b07115cbd98ee70aada2637ac26b522497d8434a3f471bb7baf48c52bb9e72f3e2afc80

                      • C:\ProgramData\TacticalRMM\3871614904.ps1

                        Filesize

                        631B

                        MD5

                        2e839009acca754f335573898e9b2813

                        SHA1

                        4bf40c3330ad3e7c605bea6969c7fc31f8454e54

                        SHA256

                        6573fb7db75c5decc90c58b87e4127ae4b02c2d4395735dabff94f83cb305524

                        SHA512

                        2e30252961c185d8f1ebc86d5e5e97b0481ae89321d8024eefe22f677673e31c30a8f620f2fb7a3e503b43f77f41360062b689cced6328afb9e8598859d3ba5b

                      • C:\ProgramData\TacticalRMM\619376817.ps1

                        Filesize

                        21KB

                        MD5

                        c89475fb9834a86320ac2a95da38e1f8

                        SHA1

                        4a60ef0109792f433873df5d83049bc250527e19

                        SHA256

                        8f34a695a0470b5c5f573e7ed289b617bea7529973e2d4853632c9bf46fbf5e6

                        SHA512

                        ff68b6e20039d4fe091146ccdad29a148b13fb46459cf124ebfb5ef99038e5bc50c1c054fd55e32970c36c03d0bd1b35a4ed5140c945f4009652d44323865739

                      • C:\ProgramData\TacticalRMM\639238980.ps1

                        Filesize

                        612B

                        MD5

                        cf08abf0df6e2c6db2d9f869c830509f

                        SHA1

                        ca67d293539cca8aff809f654733aee65afa75dd

                        SHA256

                        2d6645f4b4a9eee9af1863af2e0e0da37d648c749aa4ffa8e033a6d344bd1282

                        SHA512

                        156048ae7acf35904170de8a6e9b589c72528dc7bb921453e96bf6a3f1fe065f9ec5878f7996a7778f4abf88ed5966c74f97cebf3d27e793165a56e5e87a0d2d

                      • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe

                        Filesize

                        4.3MB

                        MD5

                        2f046950e65922336cd83bf0dbc9de33

                        SHA1

                        ddc64a8b21c8146c93c0b19c1eeb0ef784b980c6

                        SHA256

                        412e1f600251b21911c582e69381f677e663231f5e1d10786d88a026e00ea811

                        SHA512

                        a11cbf8b8b692d2d5a0e3af5a97f91a3d1f3e7aa39966eb7d62b3244b3913f2fdc21823d5c94de0d98e579f801709df44433af91567356361d5d9699a93b2cbc

                      • C:\Users\Admin\AppData\Local\Temp\is-STNN0.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

                        Filesize

                        3.0MB

                        MD5

                        a639312111d278fee4f70299c134d620

                        SHA1

                        6144ca6e18a5444cdb9b633a6efee67aff931115

                        SHA256

                        4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

                        SHA512

                        f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                        Filesize

                        914B

                        MD5

                        e4a68ac854ac5242460afd72481b2a44

                        SHA1

                        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                        SHA256

                        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                        SHA512

                        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        1KB

                        MD5

                        a266bb7dcc38a562631361bbf61dd11b

                        SHA1

                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                        SHA256

                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                        SHA512

                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                        Filesize

                        252B

                        MD5

                        84e930de21304cf0fd0e04ecf67e6eff

                        SHA1

                        ad9a273167be4b30c96dbb85ba33a286e7ced956

                        SHA256

                        8fdff0e1dad59ad35bed0f8e29049c0c3b4b8ab3ab4eae0d9ad6b1b662f58315

                        SHA512

                        d834175cb5ef18aa69846c3670e7238eb15b9b73745e8b0fcac21974727f8ef542cf35646648fe2f11c40a79bd6d7883b0cead1666a70e28a3e550c0bfe2d834

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        f94584e870500e6fb33c2096202e7570

                        SHA1

                        d4b960265037725ff4972342f8ecd90592727db9

                        SHA256

                        cadfc0d6d7ef58325ff41e447f16b586a1d305a94515104d2ec01c5712d0bf28

                        SHA512

                        742967aa980b6cbd1df4f0a4fa660d04a4d234c5cb46b703eee4067a32dc68ce418b30ce244a4c1a5f3a867dd9f998fcc5d7d007c052abc62b7823188c7fa33b

                      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        242B

                        MD5

                        1786a8d459fb601ad2b5737e6adbf2dc

                        SHA1

                        b3f8ece61d5ef50c2555853cd34557fa909f0787

                        SHA256

                        9e4c7ee8249140e2699205ebccfb8dbc8b30f4fa66e70b8de4b293ae14a16964

                        SHA512

                        e63caef5ab071b35941e0d8d2010842ed8c302e0abf5f02e8248b9d63f5e09cc854d4ce048244d66e2fb87c3762c15ef74af2ea6d579e2e3ff0f73b7bd743654

                      • C:\Windows\Temp\Cab9D6A.tmp

                        Filesize

                        29KB

                        MD5

                        d59a6b36c5a94916241a3ead50222b6f

                        SHA1

                        e274e9486d318c383bc4b9812844ba56f0cff3c6

                        SHA256

                        a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

                        SHA512

                        17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

                      • C:\Windows\Temp\Tar9FE1.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • \Program Files\TacticalAgent\meshagent.exe

                        Filesize

                        3.3MB

                        MD5

                        2641d5b122336e87d2964c562898caea

                        SHA1

                        ad3b817c810702c6ccd060192566350ac5eb77fd

                        SHA256

                        88b6c219763de23bbe1752aa22d408bf9b3db1926e691fd6a299beb0680c9757

                        SHA512

                        4380d048e42ad1e58a64ea0bcb1f31c4cc343e43c12e052327a997505a804f68f2b26bad77dc48d4ce04b8d5d4adc6be6878c8ce462916247bc74ef136e2c401

                      • \Program Files\TacticalAgent\tacticalrmm.exe

                        Filesize

                        9.2MB

                        MD5

                        bb383b7c3d5e4acb1001ab099b5b0f3c

                        SHA1

                        cb0c85f84a454aa4b1aab02bfba47c4355c2311e

                        SHA256

                        a6d3159c858aa3704f35d69b27829618ad0d1bae894c848a5233100c17464f95

                        SHA512

                        157dda96d1cacea55a6be27b9d432225b47d7334e664e577cef82a14c7eb1be1b8b84423b3905a4c1caecb5394be264d9b5c3e32109a4893e51a9d406ce740be

                      • memory/772-158-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/1104-120-0x0000000002010000-0x0000000002018000-memory.dmp

                        Filesize

                        32KB

                      • memory/1104-119-0x000000001B230000-0x000000001B512000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2024-25-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2024-24-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2188-7-0x0000000000401000-0x00000000004B7000-memory.dmp

                        Filesize

                        728KB

                      • memory/2188-4-0x0000000000400000-0x00000000004D7000-memory.dmp

                        Filesize

                        860KB

                      • memory/2188-30-0x0000000000400000-0x00000000004D7000-memory.dmp

                        Filesize

                        860KB

                      • memory/2196-14-0x0000000000400000-0x0000000000712000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2196-29-0x0000000000400000-0x0000000000712000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2416-34-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-128-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-92-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-81-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-80-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-79-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-78-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-77-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-71-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-47-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-46-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2416-33-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2640-287-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2640-286-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/2676-111-0x0000000001D50000-0x0000000001D58000-memory.dmp

                        Filesize

                        32KB

                      • memory/2676-110-0x000000001B240000-0x000000001B522000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/3008-533-0x00000000016E0000-0x0000000001702000-memory.dmp

                        Filesize

                        136KB

                      • memory/3008-534-0x0000000001470000-0x0000000001482000-memory.dmp

                        Filesize

                        72KB