| File name: | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat |
| Full analysis: | https://app.any.run/tasks/74967352-7e6c-404b-91f9-7ccd8610cbe6 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | June 21, 2025, 07:52:07 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 7 sections |
| MD5: | 86CDA2825DE5004944B19EF808150134 |
| SHA1: | 1F98FA2ABBCEAE4A125C829E6D44E74BE73AC7C6 |
| SHA256: | 297CCC323ED63CF6EA7BFC5F1F8797CD85185656A7CFF012262A3DA18777F599 |
| SSDEEP: | 98304:kUFz9DJpNS3w+aOhAlh1dh4ZSCTa1NYQau6qO:9Q |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 3 |
| CodeSize: | 2520576 |
| InitializedDataSize: | 246784 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x66fe0 |
| OSVersion: | 6.1 |
| ImageVersion: | 1 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 2.0.4.0 |
| ProductVersionNumber: | 2.0.4.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | AmidaWare LLC |
| FileDescription: | Tactical RMM Installer |
| FileVersion: | v2.0.4.0 |
| InternalName: | rmm.exe |
| LegalCopyright: | Copyright (c) 2022 AmidaWare LLC |
| OriginalFileName: | installer.go |
| ProductName: | Tactical RMM Installer |
| ProductVersion: | v2.0.4.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 424 | net stop tacticalagent | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 536 | C:\ProgramData\TacticalRMM\tacticalagent-v2.9.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES | C:\ProgramData\TacticalRMM\tacticalagent-v2.9.0-windows-amd64.exe | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat.exe | ||||||||||||
User: admin Company: AmidaWare Inc Integrity Level: HIGH Description: Tactical RMM Agent Setup Exit code: 0 Version: 2.9.0.0 Modules
| |||||||||||||||
| 1028 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1180 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1352 | ping 127.0.0.1 -n 2 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1472 | "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.mfisherconsultsllc.com --client-id 1 --site-id 1 --agent-type server --auth 7f171d34a5f35f261bf3f40ee1a6238401c80d1da4759f27474b6f001f476143 | C:\Program Files\TacticalAgent\tacticalrmm.exe | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat.exe | ||||||||||||
User: admin Company: AmidaWare Inc Integrity Level: HIGH Description: Tactical RMM Agent Exit code: 1 Version: v2.9.0.0 Modules
| |||||||||||||||
| 1712 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2272 | "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc | C:\Windows\SysWOW64\cmd.exe | — | tacticalagent-v2.9.0-windows-amd64.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2324 | ping 127.0.0.1 -n 2 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2532 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | Inno Setup: Setup Version |
Value: 6.2.2 | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | Inno Setup: App Path |
Value: C:\Program Files\TacticalAgent | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | InstallLocation |
Value: C:\Program Files\TacticalAgent\ | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | Inno Setup: Icon Group |
Value: (Default) | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | Inno Setup: User |
Value: admin | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | Inno Setup: Language |
Value: english | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | DisplayName |
Value: Tactical RMM Agent | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | DisplayIcon |
Value: C:\Program Files\TacticalAgent\tacticalrmm.exe | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | UninstallString |
Value: "C:\Program Files\TacticalAgent\unins000.exe" | |||
| (PID) Process: | (2964) tacticalagent-v2.9.0-windows-amd64.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0D34D278-5FAF-4159-A4A0-4E2D2C08139D}_is1 |
| Operation: | write | Name: | QuietUninstallString |
Value: "C:\Program Files\TacticalAgent\unins000.exe" /SILENT | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Users\admin\AppData\Local\Temp\is-QNNMD.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 6672 | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat.exe | C:\ProgramData\TacticalRMM\tacticalagent-v2.9.0-windows-amd64.exe | executable | |
MD5:E1001983E08A5FAE85959869C5F87C15 | SHA256:ADD9564D2A983A8E257ED1EC3593118B5C0775668A73241FFE64C9F2CE590771 | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\unins000.dat | binary | |
MD5:D94144B644C8691216B62087C4F3A833 | SHA256:EEF8F11088EB93B1E13A7025A610E968676F5DF2F44188D4DE8130202A62717B | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\is-L8QTQ.tmp | executable | |
MD5:C266DDF11B15AEDED0BB27115B969ED7 | SHA256:09B8E21734C0CAB5440CD62EC847A97DFEFC3D96DD9E656C40BB3CB55C1589DD | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\tacticalrmm.exe | executable | |
MD5:C266DDF11B15AEDED0BB27115B969ED7 | SHA256:09B8E21734C0CAB5440CD62EC847A97DFEFC3D96DD9E656C40BB3CB55C1589DD | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Users\admin\AppData\Local\Temp\Setup Log 2025-06-21 #001.txt | text | |
MD5:1CCB688A82C7D8853465545547459BC0 | SHA256:63A5AA97D45792305D0EE38DCE813B66BDA0D680527499F138D5482893DD6848 | |||
| 536 | tacticalagent-v2.9.0-windows-amd64.exe | C:\Users\admin\AppData\Local\Temp\is-JKERG.tmp\tacticalagent-v2.9.0-windows-amd64.tmp | executable | |
MD5:F7B0A85F1A18F9689015113AA1FA44EE | SHA256:CDF9A208A33E94C5BEC44A613A444AD9D7EDEA4735C0F42E894356EE5C079134 | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\unins000.exe | executable | |
MD5:231C790F354DE2EDAA9EE0A38CA3B9B1 | SHA256:156765088D513FE8FC37F2865A25178FB8B79C0C868415E3C2354F96C0B66235 | |||
| 2964 | tacticalagent-v2.9.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\is-97R3P.tmp | executable | |
MD5:231C790F354DE2EDAA9EE0A38CA3B9B1 | SHA256:156765088D513FE8FC37F2865A25178FB8B79C0C868415E3C2354F96C0B66235 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 302 | 140.82.121.3:443 | https://github.com/amidaware/rmmagent/releases/download/v2.9.0/tacticalagent-v2.9.0-windows-amd64.exe | unknown | — | — | — |
1268 | svchost.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2028 | RUXIMICS.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2028 | RUXIMICS.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 101.99.90.116:443 | https://api.mfisherconsultsllc.com/api/v3/installer/ | unknown | text | 4 b | — |
— | — | POST | 400 | 101.99.90.116:443 | https://api.mfisherconsultsllc.com/api/v3/installer/ | unknown | text | 111 b | — |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2028 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2028 | RUXIMICS.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6672 | 2025-06-21_86cda2825de5004944b19ef808150134_cobalt-strike_dosia_frostygoop_hijackloader_luca-stealer_poet-rat_quasar-rat.exe | 140.82.121.4:443 | github.com | GITHUB | US | whitelisted |
1268 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
github.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
objects.githubusercontent.com |
| whitelisted |
api.mfisherconsultsllc.com |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
— | — | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
— | — | Misc activity | ET INFO Request for EXE via GO HTTP Client |
— | — | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
— | — | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
— | — | Misc activity | ET INFO EXE - Served Attached HTTP |
— | — | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
— | — | Generic Protocol Command Decode | SURICATA HTTP Request unrecognized authorization method |
— | — | Generic Protocol Command Decode | SURICATA HTTP Request unrecognized authorization method |