General

  • Target

    2720-28-0x0000000000400000-0x000000000040C000-memory.dmp

  • Size

    48KB

  • Sample

    240322-3wkmcsdc9v

  • MD5

    a4677f72351b444ead9658410f78a4f1

  • SHA1

    dfed77718630bcbb13cba491b42d9d5fd7afcf57

  • SHA256

    cddbea55a5fb707023f826c7d355c87cf3ee4cd39abceabf84cb498264b63e8a

  • SHA512

    4bd9e4387d7bce374da5a25225312c1463c602ee9e47f4fb12b01e8447016d661b17b72611d1236711853ead8bccf1bfe820185ee3efd3a2b66272ba8d308f03

  • SSDEEP

    384:IB+Sbj6NKDRW16lVAH9BYVizqDyevPUQOvDKNrCeJE3WNgDnPr0ob7TyXUq7ZQrm:2pD06lVw9tc8QE45NknIgTyEql4Kj

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

1B5aLZh6psoQttLGn9tpbdibiWqzyh4Jfv

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Targets

    • Target

      2720-28-0x0000000000400000-0x000000000040C000-memory.dmp

    • Size

      48KB

    • MD5

      a4677f72351b444ead9658410f78a4f1

    • SHA1

      dfed77718630bcbb13cba491b42d9d5fd7afcf57

    • SHA256

      cddbea55a5fb707023f826c7d355c87cf3ee4cd39abceabf84cb498264b63e8a

    • SHA512

      4bd9e4387d7bce374da5a25225312c1463c602ee9e47f4fb12b01e8447016d661b17b72611d1236711853ead8bccf1bfe820185ee3efd3a2b66272ba8d308f03

    • SSDEEP

      384:IB+Sbj6NKDRW16lVAH9BYVizqDyevPUQOvDKNrCeJE3WNgDnPr0ob7TyXUq7ZQrm:2pD06lVw9tc8QE45NknIgTyEql4Kj

    Score
    3/10

MITRE ATT&CK Matrix

Tasks