General
-
Target
New-Client.exe
-
Size
28KB
-
Sample
221009-yr1esshghj
-
MD5
6948ce4c30feef77606271c4ef089c52
-
SHA1
d1f5a317f8b527721c94607d074e0e12ac5609ba
-
SHA256
272db647ddb23fbebe457b934fe3e960e096b26b1f4f5bfb76df2f027de535bd
-
SHA512
71ba590c5707856afbcb04c660edfea4d2b65dda8c098e8aedf3675ac8010f446111955a51cdc168833f39057de6ff408e57f80cd8177c98d07ec375191592a2
-
SSDEEP
384:qMB+Sbj6NKGfA6h5AH9RiXKqDWB/Y6nJvDKNrCeJE3WNgZREqKytZm30YpFZVjQR:1pGI6h5w97B/bnB45NeGqKN0YpFfOj
Malware Config
Extracted
limerat
-
aes_key
oracl1337
-
antivm
false
-
c2_url
https://pastebin.com/raw/2RVD1CT4
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Targets
-
-
Target
New-Client.exe
-
Size
28KB
-
MD5
6948ce4c30feef77606271c4ef089c52
-
SHA1
d1f5a317f8b527721c94607d074e0e12ac5609ba
-
SHA256
272db647ddb23fbebe457b934fe3e960e096b26b1f4f5bfb76df2f027de535bd
-
SHA512
71ba590c5707856afbcb04c660edfea4d2b65dda8c098e8aedf3675ac8010f446111955a51cdc168833f39057de6ff408e57f80cd8177c98d07ec375191592a2
-
SSDEEP
384:qMB+Sbj6NKGfA6h5AH9RiXKqDWB/Y6nJvDKNrCeJE3WNgZREqKytZm30YpFZVjQR:1pGI6h5w97B/bnB45NeGqKN0YpFfOj
-
Legitimate hosting services abused for malware hosting/C2
-