General

  • Target

    ecc1fb4b0c9b8d5492385210ede743e0_JaffaCakes118

  • Size

    254KB

  • Sample

    240411-f5jebsgd2z

  • MD5

    ecc1fb4b0c9b8d5492385210ede743e0

  • SHA1

    4eb78421227c33aaba01c70158906b3de99b0e81

  • SHA256

    a6d2258a956d6f8f3d2fd401fa7d519c1c97cd37ba971c4949b981ce221ce5f9

  • SHA512

    3eb9d2f2f9481dad5f4783a23e67b7dea047a2f460e4e880280c9f3b6d9851eac21ff14452ada7774d44e6dea80e1b7e8fdd351ab7da128cfab123e7c9ab4400

  • SSDEEP

    768:lMf0qZPxBXr178NYvGDdHIpT9SBG0B9FN48jt2VHtecomotDhI7xc5DzSEo6LFcU:IY664EB

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/sf0NTYv4

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      ecc1fb4b0c9b8d5492385210ede743e0_JaffaCakes118

    • Size

      254KB

    • MD5

      ecc1fb4b0c9b8d5492385210ede743e0

    • SHA1

      4eb78421227c33aaba01c70158906b3de99b0e81

    • SHA256

      a6d2258a956d6f8f3d2fd401fa7d519c1c97cd37ba971c4949b981ce221ce5f9

    • SHA512

      3eb9d2f2f9481dad5f4783a23e67b7dea047a2f460e4e880280c9f3b6d9851eac21ff14452ada7774d44e6dea80e1b7e8fdd351ab7da128cfab123e7c9ab4400

    • SSDEEP

      768:lMf0qZPxBXr178NYvGDdHIpT9SBG0B9FN48jt2VHtecomotDhI7xc5DzSEo6LFcU:IY664EB

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks