General
-
Target
JaffaCakes118_5fc1365c4551eaa96e69d7b71a3eacff
-
Size
1.7MB
-
Sample
250107-neacqs1jfj
-
MD5
5fc1365c4551eaa96e69d7b71a3eacff
-
SHA1
d423ee067f56c0513cbfc501118f4be00260d3e7
-
SHA256
8d6cb11ba8ff156054a0b2f68f424d033196e154e5bef124535ae36f4bd16f2f
-
SHA512
2f319691258e42d1ce29e736c791b4aa7d702bc067ea7afdfef12a1298f16fc8ddc87f41651b2872a38ce58dc804bb2a6edd96d58152504bcae297fe3c6f581f
-
SSDEEP
49152:JvKmKy0STrb/TtvO90dL3BmAFd4A64nsfJQFMgTR55IXRuz1:Jvo4zPP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5fc1365c4551eaa96e69d7b71a3eacff.exe
Resource
win7-20240708-en
Malware Config
Extracted
limerat
-
aes_key
49H8Kbf15JFN2diG5evGHA5G49qhgFBuDid86z3MKxTv59dcqySCzFWUL3SgsEk2SufzTziHp3UE5P8BatwuyFuv1bBKQw2
-
antivm
true
-
c2_url
https://pastebin.com/raw/pGEgCZKs
-
delay
3
-
download_payload
false
-
install
true
-
install_name
kick_09.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\01\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/pGEgCZKs
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
JaffaCakes118_5fc1365c4551eaa96e69d7b71a3eacff
-
Size
1.7MB
-
MD5
5fc1365c4551eaa96e69d7b71a3eacff
-
SHA1
d423ee067f56c0513cbfc501118f4be00260d3e7
-
SHA256
8d6cb11ba8ff156054a0b2f68f424d033196e154e5bef124535ae36f4bd16f2f
-
SHA512
2f319691258e42d1ce29e736c791b4aa7d702bc067ea7afdfef12a1298f16fc8ddc87f41651b2872a38ce58dc804bb2a6edd96d58152504bcae297fe3c6f581f
-
SSDEEP
49152:JvKmKy0STrb/TtvO90dL3BmAFd4A64nsfJQFMgTR55IXRuz1:Jvo4zPP
-
Limerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-