Analysis

  • max time kernel
    144s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2023 22:54

General

  • Target

    NewClientcleaned.exe

  • Size

    25KB

  • MD5

    8c0538611ff08ba2cc0d079f6d63a39b

  • SHA1

    416d4183b772ce642820a9a895f8e10d4b84daaa

  • SHA256

    ee31fd6498e39135434c49e6102c3115b88ef1f3c3fae5aed967c29742a624e0

  • SHA512

    9127d3185142d9c73ee509afd497add93576de9ff496713599f657dfb6cac11615e6815248368bcb2edb22c92f63006f86c8e239fbb697081c700f148fb5fd06

  • SSDEEP

    384:iTnK66cNcP5T5C77w1DhbxR+ajvYEgC2XTlvn7wPCU3xFMG1Hm7wmZvQro3lcqhq:uC95C77w1D9+kYEg9GFdHm7wmtBcj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    FFj+YDsYUMU0LHX0zcAU+w==

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NewClientcleaned.exe
    "C:\Users\Admin\AppData\Local\Temp\NewClientcleaned.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1552-133-0x0000000000100000-0x000000000010A000-memory.dmp

    Filesize

    40KB

  • memory/1552-134-0x0000000004A40000-0x0000000004ADC000-memory.dmp

    Filesize

    624KB

  • memory/1552-135-0x0000000004B50000-0x0000000004BB6000-memory.dmp

    Filesize

    408KB

  • memory/1552-136-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1552-137-0x0000000005740000-0x0000000005CE4000-memory.dmp

    Filesize

    5.6MB

  • memory/1552-138-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB