General
-
Target
DECL G50 EURL.xlsx
-
Size
1.2MB
-
Sample
210701-lbnp9djy16
-
MD5
b97310e2ecc75a1ac5b7cf34503d1509
-
SHA1
b34bd40fd5717e01cf5ba7cbe2bf8d5d8331783a
-
SHA256
673d9ec17f2437917846f5ce799f30399d0739c9dd3e28d3d44b80b5f91de54f
-
SHA512
e287c79a0cd275e232b3180fdf6b6c51b0c62285f5346d4ddd57e6c4e556cd1d033cef66d2939c3e7a7abd2867621fea5ba2cd52eae99db9a13acf3fa5fb22e9
Static task
static1
Behavioral task
behavioral1
Sample
DECL G50 EURL.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
DECL G50 EURL.xlsx
Resource
win10v20210410
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
DECL G50 EURL.xlsx
-
Size
1.2MB
-
MD5
b97310e2ecc75a1ac5b7cf34503d1509
-
SHA1
b34bd40fd5717e01cf5ba7cbe2bf8d5d8331783a
-
SHA256
673d9ec17f2437917846f5ce799f30399d0739c9dd3e28d3d44b80b5f91de54f
-
SHA512
e287c79a0cd275e232b3180fdf6b6c51b0c62285f5346d4ddd57e6c4e556cd1d033cef66d2939c3e7a7abd2867621fea5ba2cd52eae99db9a13acf3fa5fb22e9
Score10/10-
Modifies system executable filetype association
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-