General

  • Target

    e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.zip

  • Size

    474KB

  • Sample

    230530-mda27sha35

  • MD5

    c48faa4f3a0371948e40c1dac4d76a10

  • SHA1

    a91501d766322a52a87919e16a9696182e48193f

  • SHA256

    956489f1f1a6e2b08c8d032cd0cf0ecc6545c638fdb046ddc418c83354152fad

  • SHA512

    a1485a343d225e92fdf4505957c73eb1dae1dde3cffeb12d46ad65f6db1ed78887402208ee84ad39f1bad5f124bf7144c1f1ee65c1729cbefed252916c040628

  • SSDEEP

    12288:oOvsarPDGujOpXlsRvXkciBQbNJKS/i/4l0T8ZG/VkZyc:0GPDGWOp1kkck0e4uTUUVkZyc

Malware Config

Extracted

Family

limerat

Wallets

1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Targets

    • Target

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe

    • Size

      781KB

    • MD5

      5ddfbddf74d9e09bf434940362019979

    • SHA1

      595d69d9fc35b83cd8d6567e88ab6526582576e4

    • SHA256

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c

    • SHA512

      6fcf4f5c573986cf5ae881812bf692a4d76683d636e4a7211111fc37f11e7ac8998dc98177b3efbbbf36ffd61346fa0aa5853231ee8337816ab7585ee4b9b693

    • SSDEEP

      12288:fClBbX5Ty5syL0CR8gotz/S31L/5C9RJl7ICfLcpy:faUxLPigotulL/I9RACfLco

    • Detect Neshta payload

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks