General
-
Target
notarat.exe
-
Size
28KB
-
Sample
230428-t8n1wahb7w
-
MD5
196ef3b30548e414e2b4a76dd0609201
-
SHA1
09fb2eb488a32c37ca99c3d34dcf065531fcf2e8
-
SHA256
fd3a5396eaa4725e9e17e35ef05fd34f0762a2f04fb302c43bb7052e53ab5ad6
-
SHA512
bece8365964fdd6c3a8586c6e5e35b52b8aceb729231ce8c2bd3388e78530c9b72f9d163d0082c39a595cfaac0c22843e14b016831de95dd22fb45b52ad3c4ed
-
SSDEEP
384:WB+Sbj6NKSZE6nrAHtRopHBqDMl5peN9dAvDKNrCeJE3WNg6TDOJqAHjgR988fuC:MpS26nrwtRo1lCNPu45NvQnHjeUHuj
Behavioral task
behavioral1
Sample
notarat.exe
Resource
win7-20230220-en
Malware Config
Extracted
limerat
-
aes_key
1111
-
antivm
false
-
c2_url
https://pastebin.com/raw/hq1MSJc0
-
delay
3
-
download_payload
false
-
install
true
-
install_name
FLOPPA.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\FLopping\
-
usb_spread
false
Targets
-
-
Target
notarat.exe
-
Size
28KB
-
MD5
196ef3b30548e414e2b4a76dd0609201
-
SHA1
09fb2eb488a32c37ca99c3d34dcf065531fcf2e8
-
SHA256
fd3a5396eaa4725e9e17e35ef05fd34f0762a2f04fb302c43bb7052e53ab5ad6
-
SHA512
bece8365964fdd6c3a8586c6e5e35b52b8aceb729231ce8c2bd3388e78530c9b72f9d163d0082c39a595cfaac0c22843e14b016831de95dd22fb45b52ad3c4ed
-
SSDEEP
384:WB+Sbj6NKSZE6nrAHtRopHBqDMl5peN9dAvDKNrCeJE3WNg6TDOJqAHjgR988fuC:MpS26nrwtRo1lCNPu45NvQnHjeUHuj
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-