Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 08:16
Behavioral task
behavioral1
Sample
9ed684c16d180e8fad345ad752c38d982c4bd87852ce36bf22ba881b4d9521f2.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
9ed684c16d180e8fad345ad752c38d982c4bd87852ce36bf22ba881b4d9521f2.exe
-
Size
28KB
-
MD5
ebee4feab38455ef71c85f620860024b
-
SHA1
507e6b0e19b4a74709cd2e568429636f75ebf100
-
SHA256
9ed684c16d180e8fad345ad752c38d982c4bd87852ce36bf22ba881b4d9521f2
-
SHA512
a14adc602194f133a5e9b928c231da2d1babf08bad397ae687766ef4225ed1ba974803d7e0bd276d188a8975bc43a80f11180c24ea524d3ad41d9a47a507adca
-
SSDEEP
384:zB+Sbj6NKOh269tAHN2weOqD6gPy7yVvDKNrCeJE3WNga2V7zNostmIFQro3lcu4:9pOc69twNVg67yl45NP2V7zHmmbEj
Malware Config
Extracted
Family
limerat
Wallets
1C8iMa4qE4AKMstVq5ToMswT8ZUgT7eTnH
Attributes
-
aes_key
lim
-
antivm
true
-
c2_url
https://pastebin.com/raw/R2nB6NU0
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 9ed684c16d180e8fad345ad752c38d982c4bd87852ce36bf22ba881b4d9521f2.exe Token: SeDebugPrivilege 2200 9ed684c16d180e8fad345ad752c38d982c4bd87852ce36bf22ba881b4d9521f2.exe