General
-
Target
b8e0c2a24d5cf91635ea9ba58a6a05f5
-
Size
1.1MB
-
Sample
240307-q3znmscf58
-
MD5
b8e0c2a24d5cf91635ea9ba58a6a05f5
-
SHA1
29682af8815a0392780aa51ae3259ced1894e590
-
SHA256
a3347937b18828817414419e8d01ff32c7eea9090cf0d98a1074fbd38160398f
-
SHA512
049acf8c821309fd6bae067e6966ba91d776ed95bf6105f8cfd5e99c275df2e40f5f44eb83a445a34321d8174f7d784e50e9dd5ee8e1fd2ff948d930cc714f1b
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa97aWtjzjFtuM253:/h+ZkldoPK8Ya971XjFtA3
Static task
static1
Behavioral task
behavioral1
Sample
b8e0c2a24d5cf91635ea9ba58a6a05f5.exe
Resource
win7-20240221-en
Malware Config
Extracted
limerat
1JBKLGyE6AnRGvk92A8x3m8qmXfh3fcEty
-
aes_key
nulled
-
antivm
true
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Winservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
b8e0c2a24d5cf91635ea9ba58a6a05f5
-
Size
1.1MB
-
MD5
b8e0c2a24d5cf91635ea9ba58a6a05f5
-
SHA1
29682af8815a0392780aa51ae3259ced1894e590
-
SHA256
a3347937b18828817414419e8d01ff32c7eea9090cf0d98a1074fbd38160398f
-
SHA512
049acf8c821309fd6bae067e6966ba91d776ed95bf6105f8cfd5e99c275df2e40f5f44eb83a445a34321d8174f7d784e50e9dd5ee8e1fd2ff948d930cc714f1b
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa97aWtjzjFtuM253:/h+ZkldoPK8Ya971XjFtA3
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-