General

  • Target

    New-Client.exe

  • Size

    28KB

  • Sample

    250126-bfyeqsyjdr

  • MD5

    4d0aec8bfc492c14b05ae73d77ddeb88

  • SHA1

    e2146826dd9e6ba28928647ede836bba4fd6513d

  • SHA256

    9a0132ffa2f357a871d69f52639ac651f2d637f7c3abe48dac828c3a020e44ec

  • SHA512

    a262580d4ff3a29c5e3a4f6d067ca4612eb4409808dc52adb6f4ac1b7fb4bc32fcc627192a787afc4466f2b14ffb716e5deab11bc728d6814d9fefc68715eb85

  • SSDEEP

    384:cB+Sbj6NKSR+6VFAHaYzLqDT8tUIjuvDKNrCeJE3WNgbfxuKJNNaceFo8xQro3lf:6pSE6VFwaNDIjk45NsgKJX62mpj

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

bc1qnrh7c6hgx0c5yrr5e62my3874haeqkeq4cpjpg

Attributes
  • aes_key

    1111

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/JbhT4370

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Nexus.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \System\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/JbhT4370

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      New-Client.exe

    • Size

      28KB

    • MD5

      4d0aec8bfc492c14b05ae73d77ddeb88

    • SHA1

      e2146826dd9e6ba28928647ede836bba4fd6513d

    • SHA256

      9a0132ffa2f357a871d69f52639ac651f2d637f7c3abe48dac828c3a020e44ec

    • SHA512

      a262580d4ff3a29c5e3a4f6d067ca4612eb4409808dc52adb6f4ac1b7fb4bc32fcc627192a787afc4466f2b14ffb716e5deab11bc728d6814d9fefc68715eb85

    • SSDEEP

      384:cB+Sbj6NKSR+6VFAHaYzLqDT8tUIjuvDKNrCeJE3WNgbfxuKJNNaceFo8xQro3lf:6pSE6VFwaNDIjk45NsgKJX62mpj

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Limerat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks