General
-
Target
BLTools 2.5 by Lukyy.exe
-
Size
95KB
-
Sample
241118-b13j7avhqm
-
MD5
e6df3f5026e18a97eb35edf5c0e495c9
-
SHA1
ca6735634fb04ee28e71cab27fb1fe1de150315e
-
SHA256
538edc7ac07999b9551153f7db6a90b7a4ba95cd0307d1e617a3ecde2d486d73
-
SHA512
1eb49e6b47688c5352936926ec1e07afbc6012613067da183425976b6114bb28178008a9f88b337d3c53948a41d69fd63935a4dcc0dd01399205428d6e13107e
-
SSDEEP
768:6pRS6bcwLoR9hy245NLxW+FjJ0eSvH9ZcTyrzgEhR2nsCt7CNFd7mic2knK+:6p5cwL4IXfxb1nC9ZcKOsCtKjb+
Behavioral task
behavioral1
Sample
BLTools 2.5 by Lukyy.exe
Resource
win7-20241010-en
Malware Config
Extracted
limerat
bc1q0gmdxcfwzc5wnfpk36nmvuyqnuhz775nzlassz
-
aes_key
hakai
-
antivm
true
-
c2_url
https://pastebin.com/raw/CpekHPPQ
-
delay
5
-
download_payload
false
-
install
true
-
install_name
Microsoft.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Microsoft\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/CpekHPPQ
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
BLTools 2.5 by Lukyy.exe
-
Size
95KB
-
MD5
e6df3f5026e18a97eb35edf5c0e495c9
-
SHA1
ca6735634fb04ee28e71cab27fb1fe1de150315e
-
SHA256
538edc7ac07999b9551153f7db6a90b7a4ba95cd0307d1e617a3ecde2d486d73
-
SHA512
1eb49e6b47688c5352936926ec1e07afbc6012613067da183425976b6114bb28178008a9f88b337d3c53948a41d69fd63935a4dcc0dd01399205428d6e13107e
-
SSDEEP
768:6pRS6bcwLoR9hy245NLxW+FjJ0eSvH9ZcTyrzgEhR2nsCt7CNFd7mic2knK+:6p5cwL4IXfxb1nC9ZcKOsCtKjb+
-
Limerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-