General

  • Target

    e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.rar

  • Size

    466KB

  • Sample

    230530-k4tk5aha2w

  • MD5

    2b96fd7d088b192add4db386ca641ff4

  • SHA1

    4744207b949b487ffbd25ce97019fd79dc5c0497

  • SHA256

    f34bd3e6ef8089ce353d3ca74a5039a75b1e4f94a001a6ce235d69e7ceaa278e

  • SHA512

    0a4ecd7cded88356fa8775089a100ac60763ddfcc2512a36c0ad17607c867d2e72ad0dce62fcbe315a45845040f962a27c08d77787e5e18b838d21b0e85d78ea

  • SSDEEP

    12288:+H/dWZ2MchGjxiNdPNsiieEg9VEFgbj89mC5rlq+6:+Fa2McmxiNk1g9VEF+49mC6+6

Malware Config

Extracted

Family

limerat

Wallets

1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Targets

    • Target

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe

    • Size

      781KB

    • MD5

      5ddfbddf74d9e09bf434940362019979

    • SHA1

      595d69d9fc35b83cd8d6567e88ab6526582576e4

    • SHA256

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c

    • SHA512

      6fcf4f5c573986cf5ae881812bf692a4d76683d636e4a7211111fc37f11e7ac8998dc98177b3efbbbf36ffd61346fa0aa5853231ee8337816ab7585ee4b9b693

    • SSDEEP

      12288:fClBbX5Ty5syL0CR8gotz/S31L/5C9RJl7ICfLcpy:faUxLPigotulL/I9RACfLco

    • Detect Neshta payload

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks