MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f87678ca15f8ba7e74de529502715094f818e4e2e03f99179d7e67b0c6ee6651. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LimeRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f87678ca15f8ba7e74de529502715094f818e4e2e03f99179d7e67b0c6ee6651
SHA3-384 hash: 6f20c7640e18965a449961e53d40184d3757818b460ba6812966be36ae1ee9c198e0557dd9ab59e1025f871a1682bc97
SHA1 hash: a1d4fef9a996215c97539708656090324a31fc8e
MD5 hash: c6669ea76059b5f5311c05ca4b62fe0f
humanhash: beryllium-ten-quiet-comet
File name:aguhvLvn.exe
Download: download sample
Signature LimeRAT
File size:29'184 bytes
First seen:2020-11-17 21:00:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 384:HB+Sbj6NKZYvR62u3AHtIELqDwt9AfDvDKNrCeJE3WNgB/Rq4dGxLDLQro3lcYjQ:hpZYZ62u3wtJXAfj45NaRq1pmj
Threatray 24 similar samples on MalwareBazaar
TLSH 75D26C147BE18349D39C1AF50FB162650FB0DA47A93BFB2D0CC554931D6BED18B88AE2
Reporter pmelson
Tags:exe Lime-RAT LimeRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
807
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Creating a window
DNS request
Sending a custom TCP request
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LimeRAT
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Connects to a pastebin service (likely for C&C)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected LimeRAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.LimeRAT
Status:
Malicious
First seen:
2020-11-17 21:01:05 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LimeRAT

Executable exe f87678ca15f8ba7e74de529502715094f818e4e2e03f99179d7e67b0c6ee6651

(this sample)

Comments