General

  • Target

    4674e41064471788442b3b712c152414

  • Size

    698KB

  • Sample

    240106-rq95aabee4

  • MD5

    4674e41064471788442b3b712c152414

  • SHA1

    dbcf1543238fb33bd4ef817cda8148a8e2118375

  • SHA256

    542c835beecdb583d91729b609d49a1e9e6072dce2148701faaa356723d241be

  • SHA512

    84132c2ff04e50f04993d0ceb6ed2618b80d22cf5fc5e5bf4d6dcbe6fd3d5ead30dba2951c0df9dab392b1c96c1463114fe9bb98fd13e1bc4009ac6f5ab1ed5d

  • SSDEEP

    12288:zkIUeiG2E73BzHjyOyHpBvygTUxieU66yI8ku/z0xast:lypBvygA8eU66yfgEst

Malware Config

Extracted

Family

limerat

Wallets

1NCY4zKfbzBA6apXnRcp4SEPaZc1xeYtzi

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • delay

    6

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

warzonerat

C2

businessdministration.webredirect.org:5292

Extracted

Family

njrat

Version

0.7.3

Botnet

OfficeH

C2

virtuallogoprepaidmax.duckdns.org:6527

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    1904

Targets

    • Target

      4674e41064471788442b3b712c152414

    • Size

      698KB

    • MD5

      4674e41064471788442b3b712c152414

    • SHA1

      dbcf1543238fb33bd4ef817cda8148a8e2118375

    • SHA256

      542c835beecdb583d91729b609d49a1e9e6072dce2148701faaa356723d241be

    • SHA512

      84132c2ff04e50f04993d0ceb6ed2618b80d22cf5fc5e5bf4d6dcbe6fd3d5ead30dba2951c0df9dab392b1c96c1463114fe9bb98fd13e1bc4009ac6f5ab1ed5d

    • SSDEEP

      12288:zkIUeiG2E73BzHjyOyHpBvygTUxieU66yI8ku/z0xast:lypBvygA8eU66yfgEst

    • Detect Neshta payload

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks