General
-
Target
96823cdc1c4e14f1927f4129ddb67dce8f3e3b7e88b7a4c1466aaeab7ae41b32
-
Size
28KB
-
Sample
240611-a8le7syalq
-
MD5
9af681e2accc0a497f06831ba5ad2801
-
SHA1
fef3edc7cbc6aed2034143ca6cd62ecb1fa49839
-
SHA256
96823cdc1c4e14f1927f4129ddb67dce8f3e3b7e88b7a4c1466aaeab7ae41b32
-
SHA512
67a3215ec2538d8e2b583c840f34fc44734207880532d206ce770425588a0ac25ee2d6425187df2f479cea47435bb7ce2a6ba3e51b3d45c7669a962cfe446bd4
-
SSDEEP
384:EB+Sbj6NKYcYvR62u3AHtOEtCqDQj51AvDKNrCeJE3WNgFWOoOepojEspAetLfQC:CpYcYZ62u3wtmj51u45NYjeWnpbXxvj
Behavioral task
behavioral1
Sample
96823cdc1c4e14f1927f4129ddb67dce8f3e3b7e88b7a4c1466aaeab7ae41b32.exe
Resource
win7-20231129-en
Malware Config
Extracted
limerat
-
aes_key
1
-
antivm
false
-
c2_url
https://pastebin.com/raw/DDTVwwbu
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/DDTVwwbu
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
96823cdc1c4e14f1927f4129ddb67dce8f3e3b7e88b7a4c1466aaeab7ae41b32
-
Size
28KB
-
MD5
9af681e2accc0a497f06831ba5ad2801
-
SHA1
fef3edc7cbc6aed2034143ca6cd62ecb1fa49839
-
SHA256
96823cdc1c4e14f1927f4129ddb67dce8f3e3b7e88b7a4c1466aaeab7ae41b32
-
SHA512
67a3215ec2538d8e2b583c840f34fc44734207880532d206ce770425588a0ac25ee2d6425187df2f479cea47435bb7ce2a6ba3e51b3d45c7669a962cfe446bd4
-
SSDEEP
384:EB+Sbj6NKYcYvR62u3AHtOEtCqDQj51AvDKNrCeJE3WNgFWOoOepojEspAetLfQC:CpYcYZ62u3wtmj51u45NYjeWnpbXxvj
-
Legitimate hosting services abused for malware hosting/C2
-