General
-
Target
PortFowarding.exe
-
Size
28KB
-
Sample
250331-ldgz3synt2
-
MD5
61b1dac027f18514a7a0cc6c2475528c
-
SHA1
6605992eb04bdaa3e6a5f94d5e4baf5b548ef548
-
SHA256
e76749d70a685f5f5456ce90f223404e2b7f143544426f17610a2b020b721886
-
SHA512
4007b1d52e4ffa2842a5490f5c564a8bc9e939c044cf1d6eee3295c87d9b1142057e366efb38de7d4c26af3bbf2090fbd701c2b40527187b3bb4b1b4b1435614
-
SSDEEP
768:lpYK/6Dfw9Fj+ZySZl45NWi6KQlkB6Uyj:lpofw94Z9y6i9QlkMR
Behavioral task
behavioral1
Sample
PortFowarding.exe
Resource
win11-20250313-en
Malware Config
Extracted
limerat
-
aes_key
emhook123321
-
antivm
false
-
c2_url
https://pastebin.com/raw/zVU0mnS4
-
delay
15
-
download_payload
false
-
install
true
-
install_name
svhost.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Sys\
-
usb_spread
false
Targets
-
-
Target
PortFowarding.exe
-
Size
28KB
-
MD5
61b1dac027f18514a7a0cc6c2475528c
-
SHA1
6605992eb04bdaa3e6a5f94d5e4baf5b548ef548
-
SHA256
e76749d70a685f5f5456ce90f223404e2b7f143544426f17610a2b020b721886
-
SHA512
4007b1d52e4ffa2842a5490f5c564a8bc9e939c044cf1d6eee3295c87d9b1142057e366efb38de7d4c26af3bbf2090fbd701c2b40527187b3bb4b1b4b1435614
-
SSDEEP
768:lpYK/6Dfw9Fj+ZySZl45NWi6KQlkB6Uyj:lpofw94Z9y6i9QlkMR
Score10/10-
Limerat family
-
Renames multiple (1979) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-