General
-
Target
teseter.exe
-
Size
28KB
-
Sample
220903-dgf8ysaha6
-
MD5
ac9d0921f5c1959943ec2703fc5150c4
-
SHA1
3adb1aca717b7110560fc6aa33b23aa005804ccf
-
SHA256
0a7c472a359d87921131559fe723f2ed005bcfd8fb61807d5e4390f17cdcee95
-
SHA512
9eafb7811252ed1d6361063889f2cbe03ba1f3acdf3de4bccc9f0021096f32195b08108d08729894a6ca4d7298605610554e0d8385ab6393b7702415459f0e03
-
SSDEEP
384:CB+Sbj6NKyfA6h5AH9SJuwqDnJuu+GIVmvDKNrCeJE3WNgfsP3rSNdVS0Qro3lc/:4pyI6h5w9VaGyM45NSwrSNZOj
Malware Config
Extracted
limerat
-
aes_key
test
-
antivm
false
-
c2_url
https://pastebin.com/raw/Mxua3JBT
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Targets
-
-
Target
teseter.exe
-
Size
28KB
-
MD5
ac9d0921f5c1959943ec2703fc5150c4
-
SHA1
3adb1aca717b7110560fc6aa33b23aa005804ccf
-
SHA256
0a7c472a359d87921131559fe723f2ed005bcfd8fb61807d5e4390f17cdcee95
-
SHA512
9eafb7811252ed1d6361063889f2cbe03ba1f3acdf3de4bccc9f0021096f32195b08108d08729894a6ca4d7298605610554e0d8385ab6393b7702415459f0e03
-
SSDEEP
384:CB+Sbj6NKyfA6h5AH9SJuwqDnJuu+GIVmvDKNrCeJE3WNgfsP3rSNdVS0Qro3lc/:4pyI6h5w9VaGyM45NSwrSNZOj
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-