General
-
Target
12cb486e08aceea42a1d3a2ce7eaea69
-
Size
888KB
-
Sample
231230-jtrs4sfaal
-
MD5
12cb486e08aceea42a1d3a2ce7eaea69
-
SHA1
00dddccfb0d47c296db963ae91cd9530dde9e61c
-
SHA256
fbf0388628cb2dfc1457adee1af6c5ca5ba58338f9e80b5fc496a5ead2e8c8ea
-
SHA512
d4577f9189388e0d74217120ef65233ceeba8b9b71c38f6b1346f2faec8d1df18a47d96f94f9e3eedfb7dbe245b63f0e121dd2ad83aaa03f3fb9982edad193c4
-
SSDEEP
12288:vRu10z5N3Sy5/dehF8ACG0EJKjS+UPweBMW+FEyXeiksBEc:vQSNiy5/dGoRtjSFPw7JFVS/
Static task
static1
Behavioral task
behavioral1
Sample
12cb486e08aceea42a1d3a2ce7eaea69.exe
Resource
win7-20231215-en
Malware Config
Extracted
limerat
bc1qqzgu92ktr9qnz4z8uwxkkndtapv76wn3hxt9j4
-
aes_key
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/2JryzqpH
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/2JryzqpH
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
12cb486e08aceea42a1d3a2ce7eaea69
-
Size
888KB
-
MD5
12cb486e08aceea42a1d3a2ce7eaea69
-
SHA1
00dddccfb0d47c296db963ae91cd9530dde9e61c
-
SHA256
fbf0388628cb2dfc1457adee1af6c5ca5ba58338f9e80b5fc496a5ead2e8c8ea
-
SHA512
d4577f9189388e0d74217120ef65233ceeba8b9b71c38f6b1346f2faec8d1df18a47d96f94f9e3eedfb7dbe245b63f0e121dd2ad83aaa03f3fb9982edad193c4
-
SSDEEP
12288:vRu10z5N3Sy5/dehF8ACG0EJKjS+UPweBMW+FEyXeiksBEc:vQSNiy5/dGoRtjSFPw7JFVS/
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-