General

  • Target

    8f6ac89cf44765cf26687c30d10709a1_JaffaCakes118

  • Size

    13KB

  • Sample

    240812-tsbqlstbja

  • MD5

    8f6ac89cf44765cf26687c30d10709a1

  • SHA1

    6e325167b9c1664727167761825760f219aca5d8

  • SHA256

    91209b26d05bc5198fc1475b5f8a7dbe4a1ec0d18e4dc6503c246a01938b9b3b

  • SHA512

    7cc90d2a58ccba377659e6c822a96e1e800db34c2d5ebcbdd4ec56f4f5b56e330ab7d67ab2d374908db0f2e34fb3a367594c67e56a35041ffc3d3d19406e3ea2

  • SSDEEP

    192:rJyEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:rc04Vfdj9JT9uxRgZGz0glhPuDWWx3f

Malware Config

Targets

    • Target

      8f6ac89cf44765cf26687c30d10709a1_JaffaCakes118

    • Size

      13KB

    • MD5

      8f6ac89cf44765cf26687c30d10709a1

    • SHA1

      6e325167b9c1664727167761825760f219aca5d8

    • SHA256

      91209b26d05bc5198fc1475b5f8a7dbe4a1ec0d18e4dc6503c246a01938b9b3b

    • SHA512

      7cc90d2a58ccba377659e6c822a96e1e800db34c2d5ebcbdd4ec56f4f5b56e330ab7d67ab2d374908db0f2e34fb3a367594c67e56a35041ffc3d3d19406e3ea2

    • SSDEEP

      192:rJyEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:rc04Vfdj9JT9uxRgZGz0glhPuDWWx3f

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks