General

  • Target

    PortFowarding.exe

  • Size

    28KB

  • Sample

    250331-lgm1haynx8

  • MD5

    61b1dac027f18514a7a0cc6c2475528c

  • SHA1

    6605992eb04bdaa3e6a5f94d5e4baf5b548ef548

  • SHA256

    e76749d70a685f5f5456ce90f223404e2b7f143544426f17610a2b020b721886

  • SHA512

    4007b1d52e4ffa2842a5490f5c564a8bc9e939c044cf1d6eee3295c87d9b1142057e366efb38de7d4c26af3bbf2090fbd701c2b40527187b3bb4b1b4b1435614

  • SSDEEP

    768:lpYK/6Dfw9Fj+ZySZl45NWi6KQlkB6Uyj:lpofw94Z9y6i9QlkMR

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    emhook123321

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/zVU0mnS4

  • delay

    15

  • download_payload

    false

  • install

    true

  • install_name

    svhost.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \Sys\

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/zVU0mnS4

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      PortFowarding.exe

    • Size

      28KB

    • MD5

      61b1dac027f18514a7a0cc6c2475528c

    • SHA1

      6605992eb04bdaa3e6a5f94d5e4baf5b548ef548

    • SHA256

      e76749d70a685f5f5456ce90f223404e2b7f143544426f17610a2b020b721886

    • SHA512

      4007b1d52e4ffa2842a5490f5c564a8bc9e939c044cf1d6eee3295c87d9b1142057e366efb38de7d4c26af3bbf2090fbd701c2b40527187b3bb4b1b4b1435614

    • SSDEEP

      768:lpYK/6Dfw9Fj+ZySZl45NWi6KQlkB6Uyj:lpofw94Z9y6i9QlkMR

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Limerat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks