General

  • Target

    a540aa59c9c8f8b446d670d6f486b5ec.exe

  • Size

    7.6MB

  • Sample

    210705-w4y6xkk4v2

  • MD5

    a540aa59c9c8f8b446d670d6f486b5ec

  • SHA1

    fe0347fcdd2121354f961165560c4bc199195f4c

  • SHA256

    9371abbf0b553023b6ddd05e91a3acaf95f4b5a1a38db5bf8634c1aca7e18d34

  • SHA512

    c5f0a9e1e3957f67d2e120856eb91b47395794a1ea7c8ff92c0d2f024a0c1a3ed5921f1c6eee7d509e548e2d760706bbd8b64c108e2d94de67a84cb907dc1acc

Score
10/10

Malware Config

Targets

    • Target

      a540aa59c9c8f8b446d670d6f486b5ec.exe

    • Size

      7.6MB

    • MD5

      a540aa59c9c8f8b446d670d6f486b5ec

    • SHA1

      fe0347fcdd2121354f961165560c4bc199195f4c

    • SHA256

      9371abbf0b553023b6ddd05e91a3acaf95f4b5a1a38db5bf8634c1aca7e18d34

    • SHA512

      c5f0a9e1e3957f67d2e120856eb91b47395794a1ea7c8ff92c0d2f024a0c1a3ed5921f1c6eee7d509e548e2d760706bbd8b64c108e2d94de67a84cb907dc1acc

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks