General

  • Target

    f389bcaede3b4275e90f2d9ff0e50a57

  • Size

    42KB

  • Sample

    211021-skk4msbchn

  • MD5

    f389bcaede3b4275e90f2d9ff0e50a57

  • SHA1

    b5b8d733ef241a5e57b53c8e809dd5629d4e2a31

  • SHA256

    46de87ee14fc89de41df979d9de14bd223dbd109d7f9c04eda2641091d6d005b

  • SHA512

    36ee862ec5f7c401b990f6bcde85bcbf48237729a4cef53c44a73bed461810107142e770e458f598ff8e08f69f295bf0314e4001d6c6d247052de82beadbb79c

Malware Config

Targets

    • Target

      f389bcaede3b4275e90f2d9ff0e50a57

    • Size

      42KB

    • MD5

      f389bcaede3b4275e90f2d9ff0e50a57

    • SHA1

      b5b8d733ef241a5e57b53c8e809dd5629d4e2a31

    • SHA256

      46de87ee14fc89de41df979d9de14bd223dbd109d7f9c04eda2641091d6d005b

    • SHA512

      36ee862ec5f7c401b990f6bcde85bcbf48237729a4cef53c44a73bed461810107142e770e458f598ff8e08f69f295bf0314e4001d6c6d247052de82beadbb79c

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

4
T1089

Discovery

System Information Discovery

1
T1082

Tasks