General

  • Target

    5ec2650940db1e24271b84e5553d8454f17a7c99cbb36579aa843aa09798efe3.exe

  • Size

    28KB

  • Sample

    240510-lkb3eaae79

  • MD5

    4d404ac646564376d34cfbabbfe508ec

  • SHA1

    ffa0d8f480c4f39037be40d1eba0a6b6f9016420

  • SHA256

    5ec2650940db1e24271b84e5553d8454f17a7c99cbb36579aa843aa09798efe3

  • SHA512

    6eaa4a5a60bcc3162adc3b7c6247717b602f06de137283e68bd3d1b6f95d80b5b0396fcfa464d056f44b068ec59299d3dca8f10aa04546eb9ed74d8a8944edc5

  • SSDEEP

    384:MB+Sbj6NKanim6txrAHN6XxAqDCkwrEWAvDKNrCeJE3WNgYpkynz4smES05VHED/:qpGx6txrwNpkQEWu45Nsyz4s9SeVYxj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    79ad_com

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/87JTjcjz

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    services.exe

  • main_folder

    UserProfile

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/87JTjcjz

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      5ec2650940db1e24271b84e5553d8454f17a7c99cbb36579aa843aa09798efe3.exe

    • Size

      28KB

    • MD5

      4d404ac646564376d34cfbabbfe508ec

    • SHA1

      ffa0d8f480c4f39037be40d1eba0a6b6f9016420

    • SHA256

      5ec2650940db1e24271b84e5553d8454f17a7c99cbb36579aa843aa09798efe3

    • SHA512

      6eaa4a5a60bcc3162adc3b7c6247717b602f06de137283e68bd3d1b6f95d80b5b0396fcfa464d056f44b068ec59299d3dca8f10aa04546eb9ed74d8a8944edc5

    • SSDEEP

      384:MB+Sbj6NKanim6txrAHN6XxAqDCkwrEWAvDKNrCeJE3WNgYpkynz4smES05VHED/:qpGx6txrwNpkQEWu45Nsyz4s9SeVYxj

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks