Analysis

  • max time kernel
    297s
  • max time network
    299s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07-01-2025 19:42

General

  • Target

    New-Client.exe

  • Size

    29KB

  • MD5

    1996761e16c80a70da416fb36f45efa9

  • SHA1

    b5aa8d0e8e011b53540c7bd285ca0b920f4b9748

  • SHA256

    e52b7e0775ff590cb5d184caadd53decc01d3a62d8ede7823dd7243d5f57d477

  • SHA512

    5a61da0d524dd52f9098cb1cf23f0c7935475af821d719b8673f777dcbb9a3e17107a9dbf168b393372787f69c0226146a50df8fc84bb1eb568bcc775575af85

  • SSDEEP

    384:XB+Sbj6NK2fa6JBAHN8M0hqDS5QzKvDKNrCeJE3WNgXyVgOCHoWBQro3lcDlsjr:xp2S6JBwNI5QzI45NsogOCHoWh/j

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    3455ttyhthhgh

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/uqhR5Ld1

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/uqhR5Ld1

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Limerat family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New-Client.exe
    "C:\Users\Admin\AppData\Local\Temp\New-Client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/384-0-0x000000007478E000-0x000000007478F000-memory.dmp

    Filesize

    4KB

  • memory/384-1-0x00000000009C0000-0x00000000009CC000-memory.dmp

    Filesize

    48KB

  • memory/384-2-0x00000000053B0000-0x000000000544C000-memory.dmp

    Filesize

    624KB

  • memory/384-3-0x0000000005310000-0x0000000005376000-memory.dmp

    Filesize

    408KB

  • memory/384-4-0x0000000074780000-0x0000000074F31000-memory.dmp

    Filesize

    7.7MB

  • memory/384-5-0x0000000006040000-0x00000000065E6000-memory.dmp

    Filesize

    5.6MB

  • memory/384-6-0x000000007478E000-0x000000007478F000-memory.dmp

    Filesize

    4KB

  • memory/384-7-0x0000000074780000-0x0000000074F31000-memory.dmp

    Filesize

    7.7MB