General

  • Target

    80aabd5337136686aefe2ff1e6da8d5a

  • Size

    563KB

  • Sample

    240129-x5rt5safel

  • MD5

    80aabd5337136686aefe2ff1e6da8d5a

  • SHA1

    a749d303f5a928cff0d66ac23a704b90837ea0f9

  • SHA256

    afd7b91be42e614fa8f3488f8cf2024b1a5b364c4b66c514fa86940b06c93515

  • SHA512

    5472e503c6e18297efcac3cb0b78dd1c4798f6d60695bf738aba8cfdf42902a2b9d5fb0bf35503750efd6a31ea1cb0144fa07f3f31aeaaee8bd492c0a501fe5a

  • SSDEEP

    12288:6V6zPygCa+DZjF1/A/ZMvGTsv+wD1IRJ+ZN1JBCGoOdnq1T:c6zPXCa+DZj3/SOvPGkZ13ox

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

False

Attributes
  • aes_key

    admin12345$

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/dd1yrjpH

  • download_payload

    false

  • install

    false

  • install_name

    settings.exe

  • main_folder

    False

  • payload_url

    True

  • pin_spread

    false

  • sub_folder

    True

  • usb_spread

    false

Targets

    • Target

      80aabd5337136686aefe2ff1e6da8d5a

    • Size

      563KB

    • MD5

      80aabd5337136686aefe2ff1e6da8d5a

    • SHA1

      a749d303f5a928cff0d66ac23a704b90837ea0f9

    • SHA256

      afd7b91be42e614fa8f3488f8cf2024b1a5b364c4b66c514fa86940b06c93515

    • SHA512

      5472e503c6e18297efcac3cb0b78dd1c4798f6d60695bf738aba8cfdf42902a2b9d5fb0bf35503750efd6a31ea1cb0144fa07f3f31aeaaee8bd492c0a501fe5a

    • SSDEEP

      12288:6V6zPygCa+DZjF1/A/ZMvGTsv+wD1IRJ+ZN1JBCGoOdnq1T:c6zPXCa+DZj3/SOvPGkZ13ox

    Score
    10/10
    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks