General

  • Target

    BlackSkullV2.exe

  • Size

    51KB

  • Sample

    240930-k1badawgpq

  • MD5

    07eabc6db5de229a160ef35ef2520b93

  • SHA1

    2000b5046d2cfe5efe9ef9fe2c781a0e2362cb59

  • SHA256

    f045fb1743e8dc5132304b897f9582ddf01881d76b3d34af97a5114157c1ed5e

  • SHA512

    e4ebd9577a2f6e2e41d9214dce243d63bee6f4e98562df659647b5e37fd16c9624ae7068607563e55314f40a10be7d5dd3c22875446b69b6b5b182edc2118ec4

  • SSDEEP

    1536:kp8nwtTplnav3iWvSLkhm1SDdxYEokbz:O+wtTpln9oeqdaEf

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    123499

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/zwppgXcp

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    WindowsServices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/zwppgXcp

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      BlackSkullV2.exe

    • Size

      51KB

    • MD5

      07eabc6db5de229a160ef35ef2520b93

    • SHA1

      2000b5046d2cfe5efe9ef9fe2c781a0e2362cb59

    • SHA256

      f045fb1743e8dc5132304b897f9582ddf01881d76b3d34af97a5114157c1ed5e

    • SHA512

      e4ebd9577a2f6e2e41d9214dce243d63bee6f4e98562df659647b5e37fd16c9624ae7068607563e55314f40a10be7d5dd3c22875446b69b6b5b182edc2118ec4

    • SSDEEP

      1536:kp8nwtTplnav3iWvSLkhm1SDdxYEokbz:O+wtTpln9oeqdaEf

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Renames multiple (5351) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks