Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.002
(Spearphishing Link)
T1553.002
(Code Signing)
T1219
(Remote Access Software)
CVE Profile
N/A [CISA KEV Status: Inactive]
(This campaign relies entirely on EV certificate trust abuse and social engineering rather than exploiting software vulnerabilities).
Telemetry
Hashes cee6895f7df01da489c10bf5b83770ceede79ed4e1c8c4f8ea9787a4d035c79b (TrustConnectAgent.exe)
IPs
178.128.69.245.
Domains
trustconnectsoftware.com.
Registry Keys
Origin: Insufficient Evidence.
Constraint
The payload structure resembles a ~35 MB .NET Core single-file executable that bundles legitimate brand metadata.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Update supply chain and software approval policies to strictly define permitted RMM tools, and explicitly quarantine unauthorized remote access software regardless of valid digital signatures.
DETECT (DE) – Monitoring & Analysis
Command
Implement SIEM hunting queries for network traffic to 178.128.69.245 and unauthenticated WebSocket connections typical of this RAT's C2 infrastructure.
RESPOND (RS) – Mitigation & Containment
Command
Isolate endpoints executing unexpected ZoomWorkspace.exe or MsTeams.exe binaries originating from non-standard directories.
RECOVER (RC) – Restoration & Trust
Command
Validate eradication by verifying the absence of unauthorized LogMeIn, ScreenConnect, or TrustConnect agents before initiating phased network restoration.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Harden application control policies to block binaries signed by "TrustConnect Software PTY LTD" and restrict standard user execution of unknown .NET single-file applications.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if a fake Zoom or MS Teams installer was executed.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and installed applications for unauthorized remote management tools (such as unexpected ScreenConnect or LogMeIn instances).
Hardening & References
Baseline
CIS Benchmarks.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Proofpoint Threat Insight
Vectra AI: Weaponization of EV Certificates
Proofpoint: RMM Tooling
CyberArk