MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 302dae63587747056fc6438d04aa984fcadea09d2c7ce7bf7ebeb9e3b8798106. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LimeRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 302dae63587747056fc6438d04aa984fcadea09d2c7ce7bf7ebeb9e3b8798106
SHA3-384 hash: 10d5536d58dcfe0596a70b0725c389196d242fbb21d52672c3f749bf7eb71271377e88cd6ffd81d7c4a891d784f8d525
SHA1 hash: 48e14eb9b9fb3a8d5ffc3c3d3456562c3ac5fb17
MD5 hash: 48390513a0096f95fe18ba96582305e5
humanhash: rugby-california-carolina-tennis
File name:E9uWcU7Y.exe
Download: download sample
Signature LimeRAT
File size:29'184 bytes
First seen:2020-09-28 18:32:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 384:PB+Sbj6NK2fv6ZRAHN8A+qD/hUlA/8vDKNrCeJE3WNgGuGOx64pGVlBcQro3lcYr:pp2H6ZRwNFi6/y45NiBsDVl8Nj
Threatray 18 similar samples on MalwareBazaar
TLSH C7D26D1477E19345D3DD1AB60F7162190FB1DA07A93BFF2D0CC960971AA7EC18A84ED2
Reporter pmelson
Tags:exe Lime-RAT LimeRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
832
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a window
DNS request
Sending a custom TCP request
Connection attempt
Result
Threat name:
LimeRAT
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to a pastebin service (likely for C&C)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected LimeRAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.LimeRAT
Status:
Malicious
First seen:
2020-09-28 18:34:10 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Legitimate hosting services abused for malware hosting/C2
Unpacked files
SH256 hash:
302dae63587747056fc6438d04aa984fcadea09d2c7ce7bf7ebeb9e3b8798106
MD5 hash:
48390513a0096f95fe18ba96582305e5
SHA1 hash:
48e14eb9b9fb3a8d5ffc3c3d3456562c3ac5fb17
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LimeRAT

Executable exe 302dae63587747056fc6438d04aa984fcadea09d2c7ce7bf7ebeb9e3b8798106

(this sample)

Comments