General

  • Target

    3a998d2d3e89f9faa6049ab5f558dc5c_JaffaCakes118

  • Size

    28KB

  • Sample

    241012-r69tfszgpm

  • MD5

    3a998d2d3e89f9faa6049ab5f558dc5c

  • SHA1

    dbe718ca2975f66c1fe71c2e3f90875f3c5dda65

  • SHA256

    e17ccf577de45924b8667a25fed7a0bbcf88a0f39b453887a915cacb0dd66761

  • SHA512

    5a1ccdc7d794bdc9a09f0d26a3b279c06da8efe7f39dcf50f8018e4730c605998ffee5938a5cba31e806f48aa940f4e861cbd29a360f856f08a59da9338c7c61

  • SSDEEP

    384:62+Sbj6NKUSs6/DAt9iXCqDtS7H+ovDKNrCeJE3WNgLOGngyFT3DKSNQro3lcSMQ:npUP6/Dq9GS7H+m45N8//3DKSDj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    25685535

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/ECrBZ5F2

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Yoooo.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \Yoooo\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/ECrBZ5F2

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      3a998d2d3e89f9faa6049ab5f558dc5c_JaffaCakes118

    • Size

      28KB

    • MD5

      3a998d2d3e89f9faa6049ab5f558dc5c

    • SHA1

      dbe718ca2975f66c1fe71c2e3f90875f3c5dda65

    • SHA256

      e17ccf577de45924b8667a25fed7a0bbcf88a0f39b453887a915cacb0dd66761

    • SHA512

      5a1ccdc7d794bdc9a09f0d26a3b279c06da8efe7f39dcf50f8018e4730c605998ffee5938a5cba31e806f48aa940f4e861cbd29a360f856f08a59da9338c7c61

    • SSDEEP

      384:62+Sbj6NKUSs6/DAt9iXCqDtS7H+ovDKNrCeJE3WNgLOGngyFT3DKSNQro3lcSMQ:npUP6/Dq9GS7H+m45N8//3DKSDj

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks