General
-
Target
2720-28-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
Sample
240322-3wkmcsdc9v
-
MD5
a4677f72351b444ead9658410f78a4f1
-
SHA1
dfed77718630bcbb13cba491b42d9d5fd7afcf57
-
SHA256
cddbea55a5fb707023f826c7d355c87cf3ee4cd39abceabf84cb498264b63e8a
-
SHA512
4bd9e4387d7bce374da5a25225312c1463c602ee9e47f4fb12b01e8447016d661b17b72611d1236711853ead8bccf1bfe820185ee3efd3a2b66272ba8d308f03
-
SSDEEP
384:IB+Sbj6NKDRW16lVAH9BYVizqDyevPUQOvDKNrCeJE3WNgDnPr0ob7TyXUq7ZQrm:2pD06lVw9tc8QE45NknIgTyEql4Kj
Behavioral task
behavioral1
Sample
2720-28-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2720-28-0x0000000000400000-0x000000000040C000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
limerat
1B5aLZh6psoQttLGn9tpbdibiWqzyh4Jfv
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/LJe9sUk5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
2720-28-0x0000000000400000-0x000000000040C000-memory.dmp
-
Size
48KB
-
MD5
a4677f72351b444ead9658410f78a4f1
-
SHA1
dfed77718630bcbb13cba491b42d9d5fd7afcf57
-
SHA256
cddbea55a5fb707023f826c7d355c87cf3ee4cd39abceabf84cb498264b63e8a
-
SHA512
4bd9e4387d7bce374da5a25225312c1463c602ee9e47f4fb12b01e8447016d661b17b72611d1236711853ead8bccf1bfe820185ee3efd3a2b66272ba8d308f03
-
SSDEEP
384:IB+Sbj6NKDRW16lVAH9BYVizqDyevPUQOvDKNrCeJE3WNgDnPr0ob7TyXUq7ZQrm:2pD06lVw9tc8QE45NknIgTyEql4Kj
Score3/10 -