General

  • Target

    369caea879ce15a7146b74e59ac7e172faa742d053634bfa436637c150c0c85a.exe

  • Size

    31KB

  • Sample

    240511-p87e1abg74

  • MD5

    cc893a8b514d6874965dd29c0c473732

  • SHA1

    69f56d454e6facba1eadffbdc7c2bf826b01ceaf

  • SHA256

    369caea879ce15a7146b74e59ac7e172faa742d053634bfa436637c150c0c85a

  • SHA512

    9ce978051ec948e2178a2cbbaf3b72d8367b0b711772ab7c903c34362c0ad848d152fd73babdeca5b86a775460075f526e42ddd4a0062b7b0330b45d495ac9e9

  • SSDEEP

    384:71B+Sbj6NKGHU637AHtKnDqD1Hg3IWcvDKNrCeJE3WNgW1+PgpQB6SDi5GbQro3j:7vpG0637wtJA3IWS45NL+PgSB4g8jEP

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    Venom

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/9YkEF3aU

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Google.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \system\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/9YkEF3aU

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      369caea879ce15a7146b74e59ac7e172faa742d053634bfa436637c150c0c85a.exe

    • Size

      31KB

    • MD5

      cc893a8b514d6874965dd29c0c473732

    • SHA1

      69f56d454e6facba1eadffbdc7c2bf826b01ceaf

    • SHA256

      369caea879ce15a7146b74e59ac7e172faa742d053634bfa436637c150c0c85a

    • SHA512

      9ce978051ec948e2178a2cbbaf3b72d8367b0b711772ab7c903c34362c0ad848d152fd73babdeca5b86a775460075f526e42ddd4a0062b7b0330b45d495ac9e9

    • SSDEEP

      384:71B+Sbj6NKGHU637AHtKnDqD1Hg3IWcvDKNrCeJE3WNgW1+PgpQB6SDi5GbQro3j:7vpG0637wtJA3IWS45NL+PgSB4g8jEP

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks