Behavioral task
behavioral1
Sample
4f35e245a543eb6888dd7d2d3cd32be839d7925b857d78d3721999c383bb9dbd.exe
Resource
win7-20230712-en
General
-
Target
7595d2720aa7240588903df1a84bc840.bin
-
Size
14KB
-
MD5
4fecc183ecd4417b660c1adf05e640ce
-
SHA1
f8cf30a6c664d84f949c3c5bad0bfc989667cba3
-
SHA256
afdd385130c2937340353d667a880a107e027ae7f75aabc59ce9ddabd2ebb77a
-
SHA512
59aa32b8a0b56145ffec661ef2341d96cfcdbc612afbb7b096eac25922064dc701b4fcc6237dc565aba0381e8a9732287c323046a3f12bd3a93ccf695500d686
-
SSDEEP
192:TkRCAnVHJy1lnAFHid95Dw51wn6TU8R/lkJ8yP2IF2L36sQd9jB0Ygey:TkRjnNo1dsQD41s6Z/67P2IEmPjB0Y6
Malware Config
Extracted
limerat
-
aes_key
123
-
antivm
false
-
c2_url
https://pastebin.com/raw/bCzwnKS8
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Signatures
-
Limerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/4f35e245a543eb6888dd7d2d3cd32be839d7925b857d78d3721999c383bb9dbd.exe
Files
-
7595d2720aa7240588903df1a84bc840.bin.zip
Password: infected
-
4f35e245a543eb6888dd7d2d3cd32be839d7925b857d78d3721999c383bb9dbd.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ