Static task
static1
Behavioral task
behavioral1
Sample
ee017dc0bd6592bb873764680d56f4ee7ab5ac88354459dd6ee66e112c806dfd.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
ee017dc0bd6592bb873764680d56f4ee7ab5ac88354459dd6ee66e112c806dfd.exe
-
Size
28KB
-
MD5
5b102acd3bec1d5bd9adee9cf64839ea
-
SHA1
303aa06f3d7e2963fd5bc8a49778983cc32ad648
-
SHA256
ee017dc0bd6592bb873764680d56f4ee7ab5ac88354459dd6ee66e112c806dfd
-
SHA512
048b0fccebbdc2e712177dbfb950d3d756aa813c4f8d3701168a652a9dcb8421eeae10f7dc2e1dea4af87deda06b1a5dc78f7e9eb245ad6db8a082dff848428a
Score
10/10
Malware Config
Extracted
Family
limerat
Wallets
bc1qe88ygu7xcv94gtk6wdnkhks5dpchwnvasjr4pf
Attributes
-
aes_key
lime
-
antivm
true
-
c2_url
https://pastebin.com/raw/d2wuKbQW
-
delay
4
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Limerat family
Files
-
ee017dc0bd6592bb873764680d56f4ee7ab5ac88354459dd6ee66e112c806dfd.exe.exe windows x86