General
-
Target
xdwd.exe
-
Size
25KB
-
Sample
241101-wsxn7atdnh
-
MD5
aae04417cc07c39988d4fbe0e85fc9bd
-
SHA1
2d51b49f8f1faeba674dd0993911e8f65b4d2258
-
SHA256
f81bc717944ec8a599c8276d9d3b1de4b995d5570139590d263b39e47e87ba3d
-
SHA512
53cc6468da9be1f4a3cc3089b1ed6a7544eb5cc5f91ae8dc1390688ffe10ad9aff1df224a5cd936276440ee95cb4afcaec7cf4f63332297864179c3266560dfb
-
SSDEEP
384:EB+Sbj6NKIPw6LZhAHt2vTh34EnWb5j4kDhlzCTJEUmNYEYQro3lcOjsjr:CpI46Lnwt4aE+RHtN8oj
Behavioral task
behavioral1
Sample
xdwd.exe
Resource
win7-20241010-en
Malware Config
Extracted
limerat
-
aes_key
1337
-
antivm
false
-
c2_url
https://pastebin.com/raw/rACMKa5f
-
delay
3
-
download_payload
false
-
install
true
-
install_name
xdwd.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\xdwd\
-
usb_spread
true
Targets
-
-
Target
xdwd.exe
-
Size
25KB
-
MD5
aae04417cc07c39988d4fbe0e85fc9bd
-
SHA1
2d51b49f8f1faeba674dd0993911e8f65b4d2258
-
SHA256
f81bc717944ec8a599c8276d9d3b1de4b995d5570139590d263b39e47e87ba3d
-
SHA512
53cc6468da9be1f4a3cc3089b1ed6a7544eb5cc5f91ae8dc1390688ffe10ad9aff1df224a5cd936276440ee95cb4afcaec7cf4f63332297864179c3266560dfb
-
SSDEEP
384:EB+Sbj6NKIPw6LZhAHt2vTh34EnWb5j4kDhlzCTJEUmNYEYQro3lcOjsjr:CpI46Lnwt4aE+RHtN8oj
-
Limerat family
-
Xmrig family
-
XMRig Miner payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-