General
-
Target
NewClient.exe
-
Size
28KB
-
Sample
230513-2vpn9ahg62
-
MD5
8fd93bad82a49824862558c9871d1708
-
SHA1
4b73f9226879636841557a77099d879951da1957
-
SHA256
a408402de01a362f79a9a1676ca13407756a7c0fd3b39497bae20374da34a066
-
SHA512
9742473f7c8d90af1b2421f7e3a7e3160976728611fbd1fd2a4dd82882880e85718b051ea854386dab704fae223e77caca855caf9514acc019590761382caabd
-
SSDEEP
384:lB+Sbj6NKNJVM6phAHNuQwxqDHju9HvDKNrCeJE3WNg230dZriQro3lcqhf0ysjr:fpNzM6phwNyYju9P45NnBcj
Behavioral task
behavioral1
Sample
NewClient.exe
Resource
win7-20230220-en
Malware Config
Extracted
limerat
-
aes_key
FFj+YDsYUMU0LHX0zcAU+w==
-
antivm
true
-
c2_url
https://pastebin.com/raw/DDTVwwbu
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
NewClient.exe
-
Size
28KB
-
MD5
8fd93bad82a49824862558c9871d1708
-
SHA1
4b73f9226879636841557a77099d879951da1957
-
SHA256
a408402de01a362f79a9a1676ca13407756a7c0fd3b39497bae20374da34a066
-
SHA512
9742473f7c8d90af1b2421f7e3a7e3160976728611fbd1fd2a4dd82882880e85718b051ea854386dab704fae223e77caca855caf9514acc019590761382caabd
-
SSDEEP
384:lB+Sbj6NKNJVM6phAHNuQwxqDHju9HvDKNrCeJE3WNg230dZriQro3lcqhf0ysjr:fpNzM6phwNyYju9P45NnBcj
-
Legitimate hosting services abused for malware hosting/C2
-