General

  • Target

    2025-02-18_3eb16bfe589fa8eede0d65e4eaa97af7_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    5.0MB

  • Sample

    250218-dn88bawqak

  • MD5

    3eb16bfe589fa8eede0d65e4eaa97af7

  • SHA1

    50aa35104c75e11303a3196d580ba56f6527ab18

  • SHA256

    db8e872638fa6e88ead099d9534b38485e368fd6faf91d46cc1d5281646cfddd

  • SHA512

    09329cd9aeb9bfa754f49eaa53fb910eebdf356af66360410e3ee09c9ecefd613e9aceab3eff260d135b9772abe0171fa9ad39f1e6f21d620f4f543ef6c6f02b

  • SSDEEP

    49152:YgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGdJS5B1:v4eAuPpVW6gTVegO77fE0+efe

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.rmmlot.ru:443/agent.ashx

Attributes
  • mesh_id

    0x07F75C618491FDD85DE51F5C0F311F5A9743BCB16BBC7685DB2D3B4B4283EA4FF8C8E1CFF8BEE29C4F7ABFDDB21FF4F3

  • server_id

    E2A078A17A87828CBD5E4E7C30F987160C3400BA0B6A8D555539E5E10173389037B8F4A097ADBB7249567E93D80E71F4

  • wss

    wss://mesh.rmmlot.ru:443/agent.ashx

Targets

    • Target

      2025-02-18_3eb16bfe589fa8eede0d65e4eaa97af7_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      5.0MB

    • MD5

      3eb16bfe589fa8eede0d65e4eaa97af7

    • SHA1

      50aa35104c75e11303a3196d580ba56f6527ab18

    • SHA256

      db8e872638fa6e88ead099d9534b38485e368fd6faf91d46cc1d5281646cfddd

    • SHA512

      09329cd9aeb9bfa754f49eaa53fb910eebdf356af66360410e3ee09c9ecefd613e9aceab3eff260d135b9772abe0171fa9ad39f1e6f21d620f4f543ef6c6f02b

    • SSDEEP

      49152:YgvUDWn4eAuPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGdJS5B1:v4eAuPpVW6gTVegO77fE0+efe

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks