Analysis
-
max time kernel
47s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
90091c8c9c69b12fe47cee45e5090bf9.exe
Resource
win7-20231215-en
General
-
Target
90091c8c9c69b12fe47cee45e5090bf9.exe
-
Size
1.1MB
-
MD5
90091c8c9c69b12fe47cee45e5090bf9
-
SHA1
e7faaf6695ac2c30dbda38e576e6f50eaa04127a
-
SHA256
7d900c842228164a450c070b49db71709f73aab97f548167e79742f505e2edc7
-
SHA512
d772aeb2fc7aac1c30f0e5b4fd782b523d56c3875e40c612d24fa19e0023cee960f149b633fc98c2c2785e13d806a1fb4d32b7f29a605034acbfec54c2ebdabb
-
SSDEEP
24576:e4S/d3uKzksuksSmmRBhZfyrBvEiomcy8jh8N6ZNXZ:dKLmCZMBvEirc+N6ZNX
Malware Config
Extracted
limerat
bc1q5746qkzdr628cmq4swa02lpu2mk69t0pdxdgzs
-
aes_key
Wealth1000$
-
antivm
false
-
c2_url
https://pastebin.com/raw/LF04hVta
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4580-7-0x00000000052C0000-0x00000000052D2000-memory.dmp CustAttr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90091c8c9c69b12fe47cee45e5090bf9.exe"C:\Users\Admin\AppData\Local\Temp\90091c8c9c69b12fe47cee45e5090bf9.exe"1⤵PID:4580
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pqfTsGmCOXK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3F5.tmp"2⤵
- Creates scheduled task(s)
PID:1488
-