General

  • Target

    32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9

  • Size

    29KB

  • Sample

    230306-dff7kaad46

  • MD5

    b14bbd5479f120504684161a942a51e6

  • SHA1

    e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6

  • SHA256

    32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9

  • SHA512

    1c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08

  • SSDEEP

    768:szPy6kLTt3dO/cmTCUuMthT36Hslrjy+b:kPkLTtspTzthT36HirjT

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    mrrobot

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/mndrG70y

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    yes.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \pok\

  • usb_spread

    false

Targets

    • Target

      32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9

    • Size

      29KB

    • MD5

      b14bbd5479f120504684161a942a51e6

    • SHA1

      e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6

    • SHA256

      32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9

    • SHA512

      1c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08

    • SSDEEP

      768:szPy6kLTt3dO/cmTCUuMthT36Hslrjy+b:kPkLTtspTzthT36HirjT

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks