General
-
Target
9e416d0dbd3c5dc595ed19abafef21b70c10093c82d2ea57fe19ac0a9abb01af
-
Size
28KB
-
Sample
240327-pt5mvsfd4v
-
MD5
e3c80bd4160a930c6a18814bd404f114
-
SHA1
ba054718db83cb3bc88cbffc0e744f970284012a
-
SHA256
9e416d0dbd3c5dc595ed19abafef21b70c10093c82d2ea57fe19ac0a9abb01af
-
SHA512
44e1555c5676e7e861a7156cc6c1d0a1d2c07596445f6d468b26311220b398b521b6ebe09b61abdebfc63f1d358b2ddd18a8f079dea88398696587f511814ea3
-
SSDEEP
384:dB+Sbj6NKaxg67XAHtyfneqDh4Xe83/vDKNrCeJE3WNgcJZZ+/2Gbt8VQro3lcQD:3pay67Xwt6P83345NL82Gbt89Fj
Behavioral task
behavioral1
Sample
9e416d0dbd3c5dc595ed19abafef21b70c10093c82d2ea57fe19ac0a9abb01af.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
limerat
-
aes_key
987
-
antivm
false
-
c2_url
https://pastebin.com/raw/4n5d3XEf
-
delay
3
-
download_payload
false
-
install
true
-
install_name
system11.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\Microsoft\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/4n5d3XEf
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
9e416d0dbd3c5dc595ed19abafef21b70c10093c82d2ea57fe19ac0a9abb01af
-
Size
28KB
-
MD5
e3c80bd4160a930c6a18814bd404f114
-
SHA1
ba054718db83cb3bc88cbffc0e744f970284012a
-
SHA256
9e416d0dbd3c5dc595ed19abafef21b70c10093c82d2ea57fe19ac0a9abb01af
-
SHA512
44e1555c5676e7e861a7156cc6c1d0a1d2c07596445f6d468b26311220b398b521b6ebe09b61abdebfc63f1d358b2ddd18a8f079dea88398696587f511814ea3
-
SSDEEP
384:dB+Sbj6NKaxg67XAHtyfneqDh4Xe83/vDKNrCeJE3WNgcJZZ+/2Gbt8VQro3lcQD:3pay67Xwt6P83345NL82Gbt89Fj
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-