General

  • Target

    Google.bin.zip

  • Size

    15KB

  • Sample

    240511-qcjvhaca39

  • MD5

    f2a13641b4740e9103ac5e25225dae06

  • SHA1

    f85f51af2bc135688de0e1f67fc179f619eb8765

  • SHA256

    76ccff988772b8703f093376be4b17204eb75ea5c94bfd698a956d03623826e4

  • SHA512

    a0b507c9b22b4b0247a6b92aa0948afe487d284bd376b2bf256fb7ed6890616e59498ba062cd1050a543f1245372bf9c24517e3fedbb10e3c422ee75175e86d6

  • SSDEEP

    384:1p8OQGBV4cWcw8U5Mmoh8Zvw2sHASQqkb9EH3:IZGBx65doCC2sgS0b9e3

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    Venom

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/9YkEF3aU

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Google.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \system\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/9YkEF3aU

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      Google.bin

    • Size

      31KB

    • MD5

      cc893a8b514d6874965dd29c0c473732

    • SHA1

      69f56d454e6facba1eadffbdc7c2bf826b01ceaf

    • SHA256

      369caea879ce15a7146b74e59ac7e172faa742d053634bfa436637c150c0c85a

    • SHA512

      9ce978051ec948e2178a2cbbaf3b72d8367b0b711772ab7c903c34362c0ad848d152fd73babdeca5b86a775460075f526e42ddd4a0062b7b0330b45d495ac9e9

    • SSDEEP

      384:71B+Sbj6NKGHU637AHtKnDqD1Hg3IWcvDKNrCeJE3WNgW1+PgpQB6SDi5GbQro3j:7vpG0637wtJA3IWS45NL+PgSB4g8jEP

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks