General

  • Target

    9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118

  • Size

    81KB

  • Sample

    240813-lvvx9s1gkq

  • MD5

    9291fc52802c84ed131b5375b6fa87e7

  • SHA1

    2e77a05b0c2bc95132b5ac763bed0141ab240107

  • SHA256

    6a67b78c206658ed05a7034d5b9f240416e57671b92372fcdef36ec4d753cd5f

  • SHA512

    bc7453bfa3b67d3b10e128436bb9ccd6198896db03915293880724376fb7c081d9259d3909b068160c4a0652bb7c2fc803669720d22e345d889fb37349409361

  • SSDEEP

    1536:0V+52ozzpyU3HyrLge7vWUsoTCBbAYO71a5:0W2YpL33e7vWU/uBbHO7A5

Malware Config

Targets

    • Target

      9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118

    • Size

      81KB

    • MD5

      9291fc52802c84ed131b5375b6fa87e7

    • SHA1

      2e77a05b0c2bc95132b5ac763bed0141ab240107

    • SHA256

      6a67b78c206658ed05a7034d5b9f240416e57671b92372fcdef36ec4d753cd5f

    • SHA512

      bc7453bfa3b67d3b10e128436bb9ccd6198896db03915293880724376fb7c081d9259d3909b068160c4a0652bb7c2fc803669720d22e345d889fb37349409361

    • SSDEEP

      1536:0V+52ozzpyU3HyrLge7vWUsoTCBbAYO71a5:0W2YpL33e7vWU/uBbHO7A5

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks