General
-
Target
New-Client.exe
-
Size
28KB
-
Sample
240829-d8h7masbke
-
MD5
c322b88311ba91359d759090203972de
-
SHA1
090597f413486ac26c76e804d4ad1fd75ab75cfc
-
SHA256
94ac06213f18172bfc549d04695c55937b8c25c8a578458841bf45fcc0bfed38
-
SHA512
839b677c15a87237f6eeb6fb9c2c6a400c569761b4d67d5291472b12bb6110c740c139c048f456b96421c6d56cac1f70fb24abecd80b8f3d02b08609fc88504b
-
SSDEEP
384:7B+Sbj6NKYPpC6BZAH9i05qDOhY1xlvvDKNrCeJE3WNg5ze5V+qgcvuHQro3lcrH:lpYPo6BZw9ThYzlH45NPD06j
Malware Config
Extracted
limerat
-
aes_key
1
-
antivm
false
-
c2_url
https://pastebin.com/raw/NfVNxzHF
-
delay
3
-
download_payload
false
-
install
true
-
install_name
WinSession.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\SystemWinSession\
-
usb_spread
false
Targets
-
-
Target
New-Client.exe
-
Size
28KB
-
MD5
c322b88311ba91359d759090203972de
-
SHA1
090597f413486ac26c76e804d4ad1fd75ab75cfc
-
SHA256
94ac06213f18172bfc549d04695c55937b8c25c8a578458841bf45fcc0bfed38
-
SHA512
839b677c15a87237f6eeb6fb9c2c6a400c569761b4d67d5291472b12bb6110c740c139c048f456b96421c6d56cac1f70fb24abecd80b8f3d02b08609fc88504b
-
SSDEEP
384:7B+Sbj6NKYPpC6BZAH9i05qDOhY1xlvvDKNrCeJE3WNg5ze5V+qgcvuHQro3lcrH:lpYPo6BZw9ThYzlH45NPD06j
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-