• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
limerat malware analysis: extracting the config

LimeRAT Malware Analysis: Extracting the Config

You are here: Home / General Cyber Security News / LimeRAT Malware Analysis: Extracting the Config
April 27, 2023

Distant Accessibility Trojans (RATs) have taken the third top position in ANY. RUN’s Q1 2023 report on the most common malware varieties, earning it really probable that your business may well experience this threat.

While LimeRAT may well not be the most properly-recognised RAT household, its flexibility is what sets it apart. Capable of carrying out a broad spectrum of malicious actions, it excels not only in information exfiltration, but also in generating DDoS botnets and facilitating crypto mining. Its compact footprint enables it to elude endpoint detection techniques, generating it a stealthy adversary. Curiously, LimeRAT shares similarities with njRAT, which ANY.Run ranks as the 3rd most well-liked malware relatives in terms of uploads all through Q1 2023.

ANY.Operate scientists have lately executed an in-depth assessment of a LimeRAT sample and productively extracted its configuration. In this write-up, we are going to deliver a quick overview of that analysis.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Collected artifacts

SHA1

14836dd608efb4a0c552a4f370e5aafb340e2a5d

SHA256

6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

MD5

d36f15bef276fd447e91af6ee9e38b28

SSDEEP

3072:DDiv2GSyn88sH888wQ2wmVgMk/211h36vEcIyNTY4WZd/w1UwIwEoTqPMinXHx+i:XOayy

IPv4:

IOC

Description

20[.]199.13.167:8080

LimeRAT’s Command and Command server

Domains:

IOC

Description

https://pastebin[.]com/uncooked/sxNJt2ek

PasteBin used by LimeRAT to cover its original Command and Command server

MITRE ATT&CK®

Tactic

Method

Description

TA0005: Defense Evasion

T1027: Obfuscated Information or Information and facts

Malware is utilizing obfuscator to strip its system names, class names, etcetera.

TA0005: Protection Evasion

T1027: Obfuscated Information or Details

Malware employs Foundation64 algorithm to encode and decode info

TA0005: Protection Evasion

T1027: Obfuscated Data files or Information

Malware works by using AES algorithm to encrypt and decrypt information

ANY.Operate is jogging a confined-time provide, celebrating the 7th Cyberbirthdsay

ANY.Run is an interactive cloud malware sandbox that can extract malware configs instantly for numerous family members, saving researchers several hours of effort and hard work.

The services is celebrating its 7th anniversary and inviting all researchers to test out innovative assessment functions ordinarily reserved for pro plans, fully cost-free right until Might 5th. This involves configuring the execution natural environment with Windows 8, 10, or 11.

If you find that ANY.Run improves your malware analysis workflow, they are also providing a restricted promotion, out there right up until May well 5th: acquire 6 or 12 months of totally free use when you indicator up for a yearly or two-12 months membership, respectively.

LimeRAT Malware

Breaking down LimeRAT’s decryption algorithm

We are going to share a condensed variation of the article below. For a finish walkthrough and the extended examination, head over to ANY. RUN’s web site if you might be fascinated in discovering a lot more about the workflow they used.

Considering that the sample below overview was created in .NET, scientists used DnSpy to study the code. Instantly, it was apparent that obfuscation tactics were being remaining used:

LimeRAT MalwareSample overview in DnSpy note that use of obfuscation tactics

Nearer examination of the code revealed a course resembling the malware configuration. In this class, was a subject made up of a string that was both equally base64 encoded and encrypted.

LimeRAT MalwareProbably, malware configuration course

Continuing the code inspection, ANY.Operate researchers pinpointed a operate dependable for decrypting the string. By employing the “Read through by” filter in DnSpy, they tracked down procedures wherever the string was currently being study, which led to a complete of two methods. The to start with strategy proved unfruitful, but the second one particular looked attention-grabbing:

LimeRAT MalwareThe second x-ref is a lot more attention-grabbing. It would seem that it utilizes our string in WebClient.DownloadString strategy

This strategy turned out to be accountable for decryption. By intently examining it, it was attainable to reconstruct the system by which LimeRAT decrypts its configuration:

  • Cases of the RijndaelManaged and MD5CryptoServiceProvider courses are instantiated. As per MSDN, RijndaelManaged is an outdated implementation of the AES encryption algorithm (MITRE T1027), whilst MD5CryptoServiceProvider computes MD5 hashes.
  • A 32-byte array, initialized with zeros, is produced to keep the AES vital.
  • The essential is made by to start with calculating the MD5 hash of a unique string within the configuration class (in our evaluation, the string is “20[.]199.13.167”).
  • The original 15 bytes, followed by the first 16 bytes of the calculated hash, are copied into the previously recognized array. The remaining factor of the array stays zero.
  • The derived key is assigned to the important assets of the RijndaelManaged instance, whilst the Manner assets is configured as CipherMode.ECB.
  • In the long run, the major string undergoes decoding via the Base64 algorithm and decryption using the AES256-ECB algorithm.
  • Decrypting the string unveiled a link to a PasteBin note: https://pastebin[.]com/uncooked/sxNJt2ek. Inside this note, was LimeRAT’s Command and Management (C2) server:

    LimeRAT MalwareLimeRATs C2 discovered with decrypted info

    To wrap up

    We hope you identified this quick overview of our LimeRAT configuration decryption process insightful. For a extra detailed examination, head more than to the total write-up on ANY.RUN’s blog site, to get extra context on the ways and check out the decryption course of action making use of CyberChef.

    Also, keep in mind that ANY. RUN’s presently presenting confined-time discounts, showcasing discounts on subscriptions and an expanded element established for free of charge plans, like the ability to configure execution environments with Windows 8, 10, and 11 running techniques. This provide expires on Might 5th.

    This is an best prospect to exam out ANY.Operate and establish if it streamlines your workflow, or to protected a membership at an unbeatable price tag and reap the rewards of major time personal savings by static and behavioral investigation.

    To discover additional about this supply, visit ANY.Operate/plans.

    Observed this post attention-grabbing? Adhere to us on Twitter  and LinkedIn to read through much more exclusive information we put up.


    Some areas of this posting are sourced from:
    thehackernews.com

    Previous Post: «rtm locker's first linux ransomware strain targeting nas and esxi RTM Locker’s First Linux Ransomware Strain Targeting NAS and ESXi Hosts
    Next Post: Paperbug Attack: New Politically-Motivated Surveillance Campaign in Tajikistan paperbug attack: new politically motivated surveillance campaign in tajikistan»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
    • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
    • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
    • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
    • “Getting to Yes”: An Anti-Sales Guide for MSPs
    • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
    • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
    • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
    • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
    • 5 Threats That Reshaped Web Security This Year [2025]

    Copyright © TheCyberSecurity.News, All Rights Reserved.