General

  • Target

    Client.exe

  • Size

    252KB

  • MD5

    7746b64cfda991754c277e8dbfcb12bf

  • SHA1

    f3d05a15cf7c4f1d07bca938076cb53df9c39e16

  • SHA256

    ba34bf8ee0d74e9978464c7daa4c0f44cfeafbb2096364ee58432fd6ebbced91

  • SHA512

    04b7a7dc507c150cc21217ba41a2f0cc7448f59e5b62e2f9279540a1cd2ed4b02b56d1d20ce901f09f6e347fb6e7208bfc08f1ecf814810af9ae05cf54327334

  • SSDEEP

    6144:tEIE/UVPy/oCa+LDZWC9z589b2vknq1dis4N:iIzPygCa+DZQnq1cP

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

False

Attributes
  • aes_key

    adminsigma5214881939pashalko

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • download_payload

    false

  • install

    true

  • install_name

    MIcrosoft Teams.exe

  • main_folder

    True

  • payload_url

    True

  • pin_spread

    true

  • sub_folder

    False

  • usb_spread

    true

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Limerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections