General
-
Target
5e150a45eeb9215dee33da8f9e6c6ae9
-
Size
1.1MB
-
Sample
231222-ec5w7abffk
-
MD5
5e150a45eeb9215dee33da8f9e6c6ae9
-
SHA1
d05a8c383051ffacb104856b58eeda123bb70695
-
SHA256
ad59f7a299e7839f81f04f037be2234da036c58b2f6ed2a9c9cb109f3d18705b
-
SHA512
78cd3ac83eadb0431399f4fd0a8e68e2b7af1747323281d04b6c0dfa0bf6eb318df977ff75c1514de1c623fa43d67fffa9981f4c581533d6cb8aa75afd4e9906
-
SSDEEP
24576:JQfzEWuougTY5sC1Mp7vHyecNLWlGNxTRQY:qzTuuYp1G/yecNLWIxTR
Static task
static1
Behavioral task
behavioral1
Sample
5e150a45eeb9215dee33da8f9e6c6ae9.dll
Resource
win7-20231215-en
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
5e150a45eeb9215dee33da8f9e6c6ae9
-
Size
1.1MB
-
MD5
5e150a45eeb9215dee33da8f9e6c6ae9
-
SHA1
d05a8c383051ffacb104856b58eeda123bb70695
-
SHA256
ad59f7a299e7839f81f04f037be2234da036c58b2f6ed2a9c9cb109f3d18705b
-
SHA512
78cd3ac83eadb0431399f4fd0a8e68e2b7af1747323281d04b6c0dfa0bf6eb318df977ff75c1514de1c623fa43d67fffa9981f4c581533d6cb8aa75afd4e9906
-
SSDEEP
24576:JQfzEWuougTY5sC1Mp7vHyecNLWlGNxTRQY:qzTuuYp1G/yecNLWIxTR
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-