General
-
Target
c7d749686aa87a0826f47179002820dd.exe
-
Size
28KB
-
Sample
230121-tqsakseh6y
-
MD5
c7d749686aa87a0826f47179002820dd
-
SHA1
11e6c74a32be6e02d2c7ebb2b10b562cfaa16c9f
-
SHA256
a716b5f8a785fdbd248b36963d8a797083bf9d05dc4ae50b10536dbca81f4301
-
SHA512
7764ead079cd485c5cd2e069b69a8eca80a49f1e80d7a9426d71c5dc648a6e9cf42711255c947951f04dfa2227770714c376b43782d658b0b6826fa14d1fb4fd
-
SSDEEP
384:OB+Sbj6NKEHU637AHtSnGqDC3qSKvDKNrCeJE3WNgjLxC1zdcY2G1jVFQro3lcTe:EpE0637wtt3qSI45NmWdcJaxN7j
Behavioral task
behavioral1
Sample
c7d749686aa87a0826f47179002820dd.exe
Resource
win7-20220812-en
Malware Config
Extracted
limerat
-
aes_key
a
-
antivm
true
-
c2_url
https://pastebin.com/raw/CWD9meJm
-
delay
3
-
download_payload
false
-
install
true
-
install_name
winIogon.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\Local\
-
usb_spread
true
Targets
-
-
Target
c7d749686aa87a0826f47179002820dd.exe
-
Size
28KB
-
MD5
c7d749686aa87a0826f47179002820dd
-
SHA1
11e6c74a32be6e02d2c7ebb2b10b562cfaa16c9f
-
SHA256
a716b5f8a785fdbd248b36963d8a797083bf9d05dc4ae50b10536dbca81f4301
-
SHA512
7764ead079cd485c5cd2e069b69a8eca80a49f1e80d7a9426d71c5dc648a6e9cf42711255c947951f04dfa2227770714c376b43782d658b0b6826fa14d1fb4fd
-
SSDEEP
384:OB+Sbj6NKEHU637AHtSnGqDC3qSKvDKNrCeJE3WNgjLxC1zdcY2G1jVFQro3lcTe:EpE0637wtt3qSI45NmWdcJaxN7j
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-