General

  • Target

    1092-2-0x00000000002A0000-0x00000000002AC000-memory.dmp

  • Size

    48KB

  • Sample

    240114-we15fsdaa2

  • MD5

    c20c648c76065d7a425c06c78582d36b

  • SHA1

    2dc519f290b3ce875a0d4116f7f78e8725a6f054

  • SHA256

    c1dffe77b69ec5b8391248b6bf4298c54c94d9a1c01981c9f1716f334fb68db6

  • SHA512

    05114d2fded1b7cba6f4248fd91e093a8fa77c4dd51e146732ac7359773423189da0e2ca70ae111279fb938b90129bc7fc01da1bbf7186fcffaafc15662f780a

  • SSDEEP

    768:0ekMvI8QaB4oiErJ9QpYDdFMgdUU+dwHo:0xQ8ErfQpYnsU+d

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    NKHUB

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/K6zz3eth

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    svchost.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \OdlaçddApdad\

  • usb_spread

    true

Targets

    • Target

      1092-2-0x00000000002A0000-0x00000000002AC000-memory.dmp

    • Size

      48KB

    • MD5

      c20c648c76065d7a425c06c78582d36b

    • SHA1

      2dc519f290b3ce875a0d4116f7f78e8725a6f054

    • SHA256

      c1dffe77b69ec5b8391248b6bf4298c54c94d9a1c01981c9f1716f334fb68db6

    • SHA512

      05114d2fded1b7cba6f4248fd91e093a8fa77c4dd51e146732ac7359773423189da0e2ca70ae111279fb938b90129bc7fc01da1bbf7186fcffaafc15662f780a

    • SSDEEP

      768:0ekMvI8QaB4oiErJ9QpYDdFMgdUU+dwHo:0xQ8ErfQpYnsU+d

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

MITRE ATT&CK Matrix

Tasks