General

  • Target

    55564e31ab4a90c6114dbae25ac6c55645d6af382fb5c5ac919572f0781b2f54.exe

  • Size

    28KB

  • Sample

    240501-vg29vsdh58

  • MD5

    5911bd4ce6a3041d3d0e106d2604cc78

  • SHA1

    3402dc39379f9e2c6c09d7bd903a0ffd6dc087e7

  • SHA256

    55564e31ab4a90c6114dbae25ac6c55645d6af382fb5c5ac919572f0781b2f54

  • SHA512

    ea7c81849b0d2077bbe3fe88f8e5eaeb093f83e00c90f0b9d5b96d26387a052ff7074ad8e6bbd2bce3fd3867994b54acb9df9dd206ad2015a953c7e213a48897

  • SSDEEP

    384:QB+Sbj6NKEpS6xJAHdS/EqDiVBEZivDKNrCeJE3WNgBSqckfOybPSVJQro3lceTQ:epEY6xJwdPVBEZw45N1kf1bKZcj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    ThVmYq3t6w9z$C&F

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/cmpGkbQw

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \holidays\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/cmpGkbQw

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      55564e31ab4a90c6114dbae25ac6c55645d6af382fb5c5ac919572f0781b2f54.exe

    • Size

      28KB

    • MD5

      5911bd4ce6a3041d3d0e106d2604cc78

    • SHA1

      3402dc39379f9e2c6c09d7bd903a0ffd6dc087e7

    • SHA256

      55564e31ab4a90c6114dbae25ac6c55645d6af382fb5c5ac919572f0781b2f54

    • SHA512

      ea7c81849b0d2077bbe3fe88f8e5eaeb093f83e00c90f0b9d5b96d26387a052ff7074ad8e6bbd2bce3fd3867994b54acb9df9dd206ad2015a953c7e213a48897

    • SSDEEP

      384:QB+Sbj6NKEpS6xJAHdS/EqDiVBEZivDKNrCeJE3WNgBSqckfOybPSVJQro3lceTQ:epEY6xJwdPVBEZw45N1kf1bKZcj

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks