General
-
Target
ca0aa2179c974faa17ac77d52610e6b9
-
Size
862KB
-
Sample
240315-aysfrsca5t
-
MD5
ca0aa2179c974faa17ac77d52610e6b9
-
SHA1
eaa0b8b57420f282695da3114bd8a956b5494d8f
-
SHA256
014526d65a3edda386a301dadd624f575c4895f2666d843fd2a5d1cb2be18d4b
-
SHA512
17d330adacac922b3110f561c56190a21ccb551ef02eb553aa00ff9c46395c01dfd134aee03670d1be8088652b385cc1111722bddb78de4692bd418973feee45
-
SSDEEP
12288:MB2EKwuo3ERIzwRe6axp0fmaxcsaauf854:MB2EFwne1saLf8K
Behavioral task
behavioral1
Sample
ca0aa2179c974faa17ac77d52610e6b9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca0aa2179c974faa17ac77d52610e6b9.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
ca0aa2179c974faa17ac77d52610e6b9
-
Size
862KB
-
MD5
ca0aa2179c974faa17ac77d52610e6b9
-
SHA1
eaa0b8b57420f282695da3114bd8a956b5494d8f
-
SHA256
014526d65a3edda386a301dadd624f575c4895f2666d843fd2a5d1cb2be18d4b
-
SHA512
17d330adacac922b3110f561c56190a21ccb551ef02eb553aa00ff9c46395c01dfd134aee03670d1be8088652b385cc1111722bddb78de4692bd418973feee45
-
SSDEEP
12288:MB2EKwuo3ERIzwRe6axp0fmaxcsaauf854:MB2EFwne1saLf8K
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-