General
-
Target
New-Client.exe
-
Size
28KB
-
Sample
241130-rje1kawkfs
-
MD5
42dd04b2c91e0b8c4b6c676c0bf067bc
-
SHA1
8fb5c885299eb1fb4c93e76cc7172058a347c48b
-
SHA256
18dfa73375b80be2a9651411bdd5c4735c9738af35f086f426584ee2776d9fa3
-
SHA512
24cc5f837445c1ea3cb9c39f66186d2be23674444f6a46df296a4a0538aa5fa4bde6ad4251bc8adc74dfc5689576763e592d0713a303e8a2f7828b2bf4b34b2e
-
SSDEEP
384:GB+Sbj6NKsHU637AHteXnmqDvDj63XjUQvDKNrCeJE3WNgtTKNnqgqoXiuQro3li:8ps0637wtexv6nQe45NDNnhqVUIj
Behavioral task
behavioral1
Sample
New-Client.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
limerat
-
aes_key
ponontop
-
antivm
false
-
c2_url
https://pastebin.com/raw/U06jyvTy
-
delay
3
-
download_payload
false
-
install
true
-
install_name
sus.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\sus\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/U06jyvTy
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
New-Client.exe
-
Size
28KB
-
MD5
42dd04b2c91e0b8c4b6c676c0bf067bc
-
SHA1
8fb5c885299eb1fb4c93e76cc7172058a347c48b
-
SHA256
18dfa73375b80be2a9651411bdd5c4735c9738af35f086f426584ee2776d9fa3
-
SHA512
24cc5f837445c1ea3cb9c39f66186d2be23674444f6a46df296a4a0538aa5fa4bde6ad4251bc8adc74dfc5689576763e592d0713a303e8a2f7828b2bf4b34b2e
-
SSDEEP
384:GB+Sbj6NKsHU637AHteXnmqDvDj63XjUQvDKNrCeJE3WNgtTKNnqgqoXiuQro3li:8ps0637wtexv6nQe45NDNnhqVUIj
Score10/10-
Limerat family
-
Renames multiple (1023) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1