Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.001
Phishing: Spearphishing Attachment / Link
T1553.002
Subvert Trust Controls: Code Signing
T1059.001
Command and Scripting Interpreter: PowerShell
T1543.003
Create or Modify System Process: Windows Service
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys
T1219
Remote Access Software
CVE Profile
NVD Score: N/A
(Social Engineering / Legitimate Feature Abuse)
CISA KEV Status: Inactive.
Telemetry
IPs
136[.]0[.]157[.]51
154[.]16[.]171[.]203
173[.]195[.]100[.]77
66[.]150[.]196[.]166.
Domains
Trustconnectsoftware[.]com
Pacdashed[.]com
server[.]yakabanskreen[.]top
app[.]amazonwindowsprime[.]com.
Hashes
Unknown (Origin: Insufficient Evidence).
Registry Keys
Windows Run key (Exact hive/path: Unknown / Insufficient Evidence).
Constraint
The structure resembles a multi-stage dropper built to obfuscate its final RMM payload (e.g., ScreenConnect, Tactical RMM, Mesh Agent) through highly trusted delivery mechanisms.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Revoke trust globally for any software signed by the "TrustConnect Software PTY LTD" EV certificate and update Supply Chain Risk protocols.
DETECT (DE) – Monitoring & Analysis
Command
Query SIEM and EDR for anomalous network connections to known malicious domains such as [suspicious link removed] and hardcoded IPs like 136[.]0[.]157[.]51.
Command
Implement strict hunting queries for unexpected installations of ScreenConnect, Tactical RMM, or Mesh Agent originating from the Program Files directory via PowerShell.
RESPOND (RS) – Mitigation & Containment
Command
Isolate affected hosts from the production network immediately.
Command
Terminate illicit Windows services and purge associated Registry Run keys created by the payload.
RECOVER (RC) – Restoration & Trust
Command
Validate a clean state by auditing endpoints for residual unauthorized RMM agents prior to phased network restoration.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Deploy application control (e.g., WDAC or AppLocker) to strictly baseline approved IT management tools, ensuring unapproved RMMs cannot execute regardless of signature status.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately. (Vulnerability confirmed across default Windows environments).
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords and cycle MFA tokens using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and the System Registry for unauthorized startup applications.
Command
Manually review installed programs for unapproved remote access software (e.g., ScreenConnect, Mesh Agent) and uninstall them.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Application Whitelisting / PowerShell Execution Policies).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Microsoft Security Response / Threat Intelligence
Neowin Technology News