General
-
Target
new.exe
-
Size
851KB
-
Sample
200715-gkfam3ql9a
-
MD5
6da3f250c69c7540fc0b665bf26d9bb5
-
SHA1
5da0a0dee94cd2f49bba7d14402acb59d1650cd3
-
SHA256
af14ffe4c3aa39dd8b219ca3cf1757492183c5ac069b507a1d36bb4430057582
-
SHA512
1a09baf36739734d613bc537145e2de1b865790c99e0ec51525bc14931a1777be63163f527780d4579d9b59dc447102649b9797f10533753cff596ee6e0da56c
Static task
static1
Behavioral task
behavioral1
Sample
new.exe
Resource
win7
Behavioral task
behavioral2
Sample
new.exe
Resource
win10v200430
Malware Config
Extracted
limerat
14dRC57Wbd8UH6Bff3LNzazwSHQHkcDPik
-
aes_key
12345
-
antivm
false
-
c2_url
https://pastebin.com/raw/peS2LDTc
-
delay
3
-
download_payload
false
-
install
true
-
install_name
svchost.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
new.exe
-
Size
851KB
-
MD5
6da3f250c69c7540fc0b665bf26d9bb5
-
SHA1
5da0a0dee94cd2f49bba7d14402acb59d1650cd3
-
SHA256
af14ffe4c3aa39dd8b219ca3cf1757492183c5ac069b507a1d36bb4430057582
-
SHA512
1a09baf36739734d613bc537145e2de1b865790c99e0ec51525bc14931a1777be63163f527780d4579d9b59dc447102649b9797f10533753cff596ee6e0da56c
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-