General

  • Target

    3cf91e2b31b2d84ae549124c2f56f8e1.exe

  • Size

    28KB

  • Sample

    221026-z1kw5shba6

  • MD5

    3cf91e2b31b2d84ae549124c2f56f8e1

  • SHA1

    bbe10b56b73810c1e4d3a042ef1faf054172241e

  • SHA256

    a707faf1eae81e0d6e764c40b8b4d78b902e99a93b76eacc35f46fc50047563c

  • SHA512

    aa2d813b4fa940af350072c59c42b3a9fd36eb6c36495c3f3a25d07bec92ba22083bd962a5c526af5f123a8ced41f83a6c4cf02662ea26e34f67e9e372cd00f8

  • SSDEEP

    384:qB+Sbj6NKGpC6BZAH9+vkqDl8hETWavDKNrCeJE3WNgmNEoa4StmaNSPbQro3lcp:ApGo6BZw9rhE6445NbNpaDgHYj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    123

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/Kvy6HPa4

  • delay

    3

  • download_payload

    true

  • install

    true

  • install_name

    winlogon.exe

  • main_folder

    Temp

  • payload_url

    ApplictionFramework.exe

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Targets

    • Target

      3cf91e2b31b2d84ae549124c2f56f8e1.exe

    • Size

      28KB

    • MD5

      3cf91e2b31b2d84ae549124c2f56f8e1

    • SHA1

      bbe10b56b73810c1e4d3a042ef1faf054172241e

    • SHA256

      a707faf1eae81e0d6e764c40b8b4d78b902e99a93b76eacc35f46fc50047563c

    • SHA512

      aa2d813b4fa940af350072c59c42b3a9fd36eb6c36495c3f3a25d07bec92ba22083bd962a5c526af5f123a8ced41f83a6c4cf02662ea26e34f67e9e372cd00f8

    • SSDEEP

      384:qB+Sbj6NKGpC6BZAH9+vkqDl8hETWavDKNrCeJE3WNgmNEoa4StmaNSPbQro3lcp:ApGo6BZw9rhE6445NbNpaDgHYj

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks