Malware Analysis Report

2024-09-11 10:21

Sample ID 240529-shvkasag86
Target New-Client.exe
SHA256 527b346f79634136a0d72b1ab2288d9d9f4b75a2b7f6530edfb4c83b40b12590
Tags
limerat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

527b346f79634136a0d72b1ab2288d9d9f4b75a2b7f6530edfb4c83b40b12590

Threat Level: Known bad

The file New-Client.exe was found to be: Known bad.

Malicious Activity Summary

limerat rat

LimeRAT

Limerat family

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-29 15:08

Signatures

Limerat family

limerat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-29 15:08

Reported

2024-05-29 15:10

Platform

win11-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\New-Client.exe"

Signatures

LimeRAT

rat limerat

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\New-Client.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\New-Client.exe

"C:\Users\Admin\AppData\Local\Temp\New-Client.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pastebin.com udp
US 104.20.3.235:443 pastebin.com tcp
US 107.208.148.72:2000 tcp
US 8.8.8.8:53 235.3.20.104.in-addr.arpa udp
US 107.208.148.72:2000 tcp
US 107.208.148.72:2000 tcp
US 107.208.148.72:2000 tcp

Files

memory/1636-0-0x000000007492E000-0x000000007492F000-memory.dmp

memory/1636-1-0x0000000000970000-0x000000000097C000-memory.dmp

memory/1636-2-0x0000000005400000-0x000000000549C000-memory.dmp

memory/1636-3-0x00000000054F0000-0x0000000005556000-memory.dmp

memory/1636-4-0x0000000074920000-0x00000000750D1000-memory.dmp

memory/1636-5-0x00000000061F0000-0x0000000006796000-memory.dmp

memory/1636-6-0x0000000007640000-0x00000000076D2000-memory.dmp

memory/1636-7-0x000000007492E000-0x000000007492F000-memory.dmp

memory/1636-8-0x0000000074920000-0x00000000750D1000-memory.dmp

memory/1636-9-0x0000000001300000-0x000000000130E000-memory.dmp