Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2023 22:54
Behavioral task
behavioral1
Sample
NewClientcleaned.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
NewClientcleaned.exe
-
Size
25KB
-
MD5
8c0538611ff08ba2cc0d079f6d63a39b
-
SHA1
416d4183b772ce642820a9a895f8e10d4b84daaa
-
SHA256
ee31fd6498e39135434c49e6102c3115b88ef1f3c3fae5aed967c29742a624e0
-
SHA512
9127d3185142d9c73ee509afd497add93576de9ff496713599f657dfb6cac11615e6815248368bcb2edb22c92f63006f86c8e239fbb697081c700f148fb5fd06
-
SSDEEP
384:iTnK66cNcP5T5C77w1DhbxR+ajvYEgC2XTlvn7wPCU3xFMG1Hm7wmZvQro3lcqhq:uC95C77w1D9+kYEg9GFdHm7wmtBcj
Malware Config
Extracted
Family
limerat
Attributes
-
aes_key
FFj+YDsYUMU0LHX0zcAU+w==
-
antivm
true
-
c2_url
https://pastebin.com/raw/DDTVwwbu
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1552 NewClientcleaned.exe Token: SeDebugPrivilege 1552 NewClientcleaned.exe