General

  • Target

    a7b1c2a715bb2f2a6358825f341bcd9e3db00164f44afae1a1e8538ebfdf3a9f.exe

  • Size

    126KB

  • Sample

    240523-mmnpnadc9w

  • MD5

    08bae97aa3ca7a364e6bbe2aa6e8b8b6

  • SHA1

    f6b7179fa8cc6a3b062c8c7b5a914c5b8f6e0312

  • SHA256

    a7b1c2a715bb2f2a6358825f341bcd9e3db00164f44afae1a1e8538ebfdf3a9f

  • SHA512

    ba47cc9c514627386f1f4d202b46ef182ec332db6183f4e8f5474bd13e491d91a5f7a7ee272d1d647f98ae55e553a60229100ba645c60c2e5c87b973aaf5c5a1

  • SSDEEP

    3072:uewtvfrOPCNBz65/M6If+3Js+3JFkKeTn:RaqCxBt25

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    Jesus

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/6bPeUTd1

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Plugin.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \System\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/6bPeUTd1

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      a7b1c2a715bb2f2a6358825f341bcd9e3db00164f44afae1a1e8538ebfdf3a9f.exe

    • Size

      126KB

    • MD5

      08bae97aa3ca7a364e6bbe2aa6e8b8b6

    • SHA1

      f6b7179fa8cc6a3b062c8c7b5a914c5b8f6e0312

    • SHA256

      a7b1c2a715bb2f2a6358825f341bcd9e3db00164f44afae1a1e8538ebfdf3a9f

    • SHA512

      ba47cc9c514627386f1f4d202b46ef182ec332db6183f4e8f5474bd13e491d91a5f7a7ee272d1d647f98ae55e553a60229100ba645c60c2e5c87b973aaf5c5a1

    • SSDEEP

      3072:uewtvfrOPCNBz65/M6If+3Js+3JFkKeTn:RaqCxBt25

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks