General

  • Target

    2025-03-01_5ce3ead66ddb51cc43046e7b6f721f2f_frostygoop_hijackloader_luca-stealer_poet-rat_sliver_snatch

  • Size

    5.0MB

  • Sample

    250301-aw8d7svkx3

  • MD5

    5ce3ead66ddb51cc43046e7b6f721f2f

  • SHA1

    7e83431a37bfd8b19571763b398bce16f51d0540

  • SHA256

    e5ba98e89145a8bf4ceb2c55beaf5addc97a739b46f0a9c0c19289003ccf1d52

  • SHA512

    fb90fb93b2d4c967f4dbd0547ba9eff88f73b7d1c4d1397603459a9fdb0cee3be9e254eebe82a5f05d2a8e9d989ec655819cb7120d785ab43a83f6fde72c8f73

  • SSDEEP

    49152:zE9F4wdvDe1rb/TcvO90d7HjmAFd4A64nsfJG5BW7kU2wwuwF5JLEpKSV8Dg3y5O:QdvDeG//z5FYV8cYE5+ecE

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.jerdal.no:443/agent.ashx

Attributes
  • mesh_id

    0x863E3F134F81661620D5D7CA84DC0FFA78FE66C04B55145E8AB95232EF503881FE674FAD824291D8F99FFC4AAD5E3A5A

  • server_id

    59FEA6FF717CF6689C711668622EE09D24C49DD1C2C6945137ACBC5B4318CDC91B13297BC869E05BB9D046F8748845D7

  • wss

    wss://mesh.jerdal.no:443/agent.ashx

Targets

    • Target

      2025-03-01_5ce3ead66ddb51cc43046e7b6f721f2f_frostygoop_hijackloader_luca-stealer_poet-rat_sliver_snatch

    • Size

      5.0MB

    • MD5

      5ce3ead66ddb51cc43046e7b6f721f2f

    • SHA1

      7e83431a37bfd8b19571763b398bce16f51d0540

    • SHA256

      e5ba98e89145a8bf4ceb2c55beaf5addc97a739b46f0a9c0c19289003ccf1d52

    • SHA512

      fb90fb93b2d4c967f4dbd0547ba9eff88f73b7d1c4d1397603459a9fdb0cee3be9e254eebe82a5f05d2a8e9d989ec655819cb7120d785ab43a83f6fde72c8f73

    • SSDEEP

      49152:zE9F4wdvDe1rb/TcvO90d7HjmAFd4A64nsfJG5BW7kU2wwuwF5JLEpKSV8Dg3y5O:QdvDeG//z5FYV8cYE5+ecE

    • Detects MeshAgent payload

    • MeshAgent

      MeshAgent is an open source remote access trojan written in C++.

    • Meshagent family

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks