General
-
Target
51a36cbd556bcca8b3df6c7ef59e561a2e1a0672abe2033e87712958b07275bd
-
Size
764KB
-
Sample
230311-j6xj5agh98
-
MD5
cac78b51b4ae8c359115955f5611f2a5
-
SHA1
7f5f6600ba423235b87beb9d47239edc4bbbce48
-
SHA256
51a36cbd556bcca8b3df6c7ef59e561a2e1a0672abe2033e87712958b07275bd
-
SHA512
85e176cde37e66728da1e9aeb641ef06ed67b41b95c1cbc4b8c8fcb2411e3632784f1a023acb07aac2363944433767fc044acb1986a83478d658db54f6177b91
-
SSDEEP
12288:kIAAhJZaF75GF2ibA6Sm/HO5J9MdpNNR36UH+4ahldt8VU2EfPrHLEgkMnJ6PMWT:LAxb8AJovPR36UH+4C6u2E3TzwBT
Static task
static1
Behavioral task
behavioral1
Sample
51a36cbd556bcca8b3df6c7ef59e561a2e1a0672abe2033e87712958b07275bd.exe
Resource
win7-20230220-en
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
51a36cbd556bcca8b3df6c7ef59e561a2e1a0672abe2033e87712958b07275bd
-
Size
764KB
-
MD5
cac78b51b4ae8c359115955f5611f2a5
-
SHA1
7f5f6600ba423235b87beb9d47239edc4bbbce48
-
SHA256
51a36cbd556bcca8b3df6c7ef59e561a2e1a0672abe2033e87712958b07275bd
-
SHA512
85e176cde37e66728da1e9aeb641ef06ed67b41b95c1cbc4b8c8fcb2411e3632784f1a023acb07aac2363944433767fc044acb1986a83478d658db54f6177b91
-
SSDEEP
12288:kIAAhJZaF75GF2ibA6Sm/HO5J9MdpNNR36UH+4ahldt8VU2EfPrHLEgkMnJ6PMWT:LAxb8AJovPR36UH+4C6u2E3TzwBT
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-