Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

LimeRAT

92
Global rank
65 infographic chevron month
Month rank
65 infographic chevron week
Week rank
0
IOCs

LimeRAT is Remote Administration Trojan malware that boasts an array of harmful capabilities. While masquerading as a legitimate tool, it can perform malicious operations like encryption, keylogging, and cryptomining, which makes it appealing to cybercriminals

RAT
Type
Unknown
Origin
1 March, 2019
First seen
27 September, 2025
Last seen

How to analyze LimeRAT with ANY.RUN

RAT
Type
Unknown
Origin
1 March, 2019
First seen
27 September, 2025
Last seen

IOCs

IP addresses
193.161.193.99
3.142.81.166
3.22.30.40
3.17.7.232
3.141.177.1
192.53.173.38
83.25.236.230
91.193.75.22
156.96.60.165
139.194.4.144
212.102.39.205
41.225.34.198
194.35.114.8
192.3.157.96
92.100.148.246
188.166.34.212
83.229.75.12
192.210.214.85
71.28.247.154
193.38.55.77
Hashes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ilovesatan.m-x.cfd
niggaxd.ddnsking.com
chinomso.duckdns.org
sataniloveyou.m-x.cfd
universalchina.pserver.ru
projectblackhat.com
eurocrypter-21461.portmap.host
hustleking.myddns.me
testingvmz.ddns.net
ngrok.dalao.pub
callumssss.ddns.net
mememigg-57830.portmap.host
xyzass.duckdns.org
luisgrace000-33011.portmap.host
oxcds.duckdns.org
netpipe.warzonedns.com
niggerssuk.hopto.org
doverenewables.watchdogdns.duckdns.org
hackerhi2-26626.portmap.host
ipcheck.servehttp.com
URLs
https://pastebin.com/raw/mchxnAbT
https://pastebin.com/raw/vyNvauan
http://171.101.120.227:8080/
https://pastebin.com/raw/LzVZn2Aw
https://pastebin.com/raw/hTv7e3sA
https://pastebin.com/raw/03PEm7js
https://pastebin.com/raw/FQ6Mj5L5
https://pastebin.com/raw/9uk330hR
https://pastebin.com/raw/BJGVA0d6
https://pastebin.com/raw/DDTVwwbu
https://pastebin.com/raw/BXLPUZ5z
https://pastebin.com/raw/KiVzVFa9
https://pastebin.com/raw/eRwfjPEt
https://pastebin.com/raw/LMxcgGRQ
https://pastebin.com/raw/nEZ87Pwx
https://pastebin.com/raw/5pCMZwiw
https://pastebin.com/raw/Kvy6HPa4
https://pastebin.com/raw/rjbcbUR6
https://pastebin.com/raw/xRpfRbAn
https://pastebin.com/raw/3YAbmSCc
Last Seen at

Recent blog posts

post image
ANY.RUN Sandbox & Microsoft Sentinel: Les...
watchers 411
comments 0
post image
Fighting Telecom Cyberattacks: Investigating...
watchers 1808
comments 0
post image
Efficient SOC: How to Detect and Solve Incide...
watchers 912
comments 0

What is LimeRAT malware and cryptocurrency stealer?

Lime Remote Administration Tool (LimeRAT) is a versatile Remote Access Trojan, which also may function as ransomware, cryptominer, cryptocurrency stealer, worm, keylogger, and bot. This versatility is one of the traits that set it apart from other RATs, such as njRAT.

Similarly to Quasar RAT, LimeRAT’s code is written in C#, but is dependent on .NET 4.0, and is a part of an open-source malware library that includes Lime_Miner, Lime_Crypter, and Lime_USB. While it claims to be an educational tool for .NET malware, its robust and well-documented features make it an attractive choice for malicious activities.

Lime RAT uses multiple ports for communication, allowing for redundancy in communication channels. The initial setup only requires port numbers and an AES 128-bit encryption key for secure communication between the client and server. The payloads can be created with a simple interface of checkboxes and text input fields, allowing even inexperienced operators to produce potent, malicious binaries. Customizations include different features and icons, and settings for Command and Control infrastructure and the location for persistent drop files on targeted machines.

Once a payload has been sent to and executed on a target machine, it connects to the control panel, sending details about the system it's on, including OS, CPU, user, and more.

The panel can also automatically assign tasks, such as downloading and executing specific files. The operator can issue commands to the infected machine, initiating various attacks, including encryption for ransomware, mining Monero, enabling Remote Desktop Protocol, or stealing information.

The malware can spread like a worm through USB or pinned task bar applications. Its ransomware feature encrypts the targeted host, changing file extensions to '.Lime'. It also includes a rudimentary keylogging feature, logging only keyboard inputs, not auto-filled or clipboard data.

The screengrab feature within the control panel captures screenshots of the infected machine, while its logging feature records timestamps and IPs of connections and disconnections. Despite being an open-source, well-documented malware, Lime RAT poses a serious threat, capable of stealing a range of valuable information, encrypting data for ransom, and converting the target host into a bot.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

LimeRAT malware technical details

LimeRAT employs advanced obfuscation techniques (MITRE T1027), rendering the classes, methods, and variables in its code into a series of random glyphs. This complex obfuscation aids in evasion of static analysis.

Embedded within LimeRAT's configuration class is a Base64 encoded string. This string isn't just encoded but also encrypted, demonstrating the malware's sophisticated design. Deciphering the string involves a comprehensive understanding of LimeRAT's decryption algorithm.

The decryption mechanism is built upon the RijndaelManaged class — an implementation of the AES encryption algorithm — and the MD5CryptoServiceProvider class. To generate the AES key for decryption, LimeRAT uses the MD5 hash of a particular string from the configuration class. This MD5 hash undergoes a sequence of specific byte manipulations. Post-decryption, the original string is revealed, decoded using the Base64 algorithm, and then decrypted with the AES256-ECB algorithm.

The decrypted string exposes a critical piece of information: a link to a PasteBin note. This link is essentially the C2 address for LimeRAT, serving as a communication channel for the malware to receive commands and exfiltrate data. It's a clear example of the malware's robust concealment tactics, specifically its effective use of encrypted strings to veil C2 communications.

LimeRAT configs LimeRAT’s malware configurations

LimeRAT malware execution process explained

Typical execution flow of the LimeRAT is straight. After the initial access is made, the trojan starts its execution. Firstly, it copies itself into a user directory such as %appdata% or, in our sample, into the directory inside the admin folder. Then it runs with different filenames and starts malicious activity. Further execution flow may vary. In our sample, the C2 server is already dead and doesn't send anything back to malware. When C2 is alive, LimeRAT may download some additional modules based on the commands from C2.

Read a detailed analysis of LimeRAT in our blog.

LimeRAT process graph LimeRAT’s process graph

LimeRAT malware distribution methods

LimeRAT primarily propagates through phishing campaigns. It leverages malicious email attachments, often employing embedded macros within Office documents. Upon the execution of these macros, the payload of LimeRAT is released, initiating the infection process. Cracked software, P2P distribution channels and malvertising has also been observed.

Additionally, LimeRAT exploits drive-by downloads. It's designed to take advantage of software vulnerabilities, in both web browsers and installed applications. This can lead to the unintended downloading and installation of LimeRAT merely by visiting a compromised website.

The developers of LimeRAT are persistent in updating its exploits, which maintains its effectiveness against even the latest software patches and updates.

Notably, LimeRAT also employs worm-like behavior for spreading via removable drives. The malware is programmed to replicate itself onto any connected removable drives from an already compromised system. This ability allows LimeRAT to further propagate when these infected drives are connected to other systems.

LimeRAT malware conclusion

LimeRAT's wide range of capabilities, coupled with its lightweight footprint, advanced obfuscation and AES encryption, make it a powerful adversary. While its ability to hide its C2 communication behind encrypted strings shows off the sophisticated tactics adopted by modern malware.

The most effective way to mitigate malware threats like LimeRAT, which are typically spread through phishing, is by educating your team about the potential dangers of malicious emails. For a detailed understanding of how LimeRAT operates, it's recommended to examine its samples using a robust tool like ANY.RUN.

ANY.RUN doesn't just detect and identify this malware family, but it also simplifies the analysis of its execution process. This is particularly useful given that LimeRAT is known for its heavy use of obfuscation, which can make static analysis difficult. With ANY.RUN, the dynamic analysis of this malware becomes a more approachable task.

HAVE A LOOK AT

ValleyRAT screenshot
ValleyRAT
valleyrat
ValleyRAT is a classic remote access trojan first documented in 2023, targeting mainly Windows systems. It is used by threat actors to gain persistent access to infected devices, steal data, and control compromised machines. ValleyRAT is notable for its relatively advanced evasion techniques and its connections to a prominent Chinese APT group.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
DarkCloud screenshot
DarkCloud
darkcloud
DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More
Jigsaw screenshot
Jigsaw
jigsaw
The Jigsaw ransomware, initially detected in 2016, encrypts files on compromised systems and requires a ransom payment in Bitcoin. If the ransom is not paid, the malware starts deleting files, increasing the pressure on victims to comply. Its source code is publicly accessible, allowing various threat actors to customize and repurpose the malware for different objectives.
Read More