Behavioral task
behavioral1
Sample
notarat.exe
Resource
win7-20230220-en
General
-
Target
notarat.exe
-
Size
28KB
-
MD5
196ef3b30548e414e2b4a76dd0609201
-
SHA1
09fb2eb488a32c37ca99c3d34dcf065531fcf2e8
-
SHA256
fd3a5396eaa4725e9e17e35ef05fd34f0762a2f04fb302c43bb7052e53ab5ad6
-
SHA512
bece8365964fdd6c3a8586c6e5e35b52b8aceb729231ce8c2bd3388e78530c9b72f9d163d0082c39a595cfaac0c22843e14b016831de95dd22fb45b52ad3c4ed
-
SSDEEP
384:WB+Sbj6NKSZE6nrAHtRopHBqDMl5peN9dAvDKNrCeJE3WNg6TDOJqAHjgR988fuC:MpS26nrwtRo1lCNPu45NvQnHjeUHuj
Malware Config
Extracted
limerat
-
aes_key
1111
-
antivm
false
-
c2_url
https://pastebin.com/raw/hq1MSJc0
-
delay
3
-
download_payload
false
-
install
true
-
install_name
FLOPPA.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\FLopping\
-
usb_spread
false
Signatures
-
Limerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource notarat.exe
Files
-
notarat.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ