General

  • Target

    9397fe9df767ee51ed4b3847a4aa45a8_JaffaCakes118

  • Size

    136KB

  • Sample

    240813-sf5mgsvfmj

  • MD5

    9397fe9df767ee51ed4b3847a4aa45a8

  • SHA1

    ce2a8b18dbb5b7bcda019b1ccc58049c923edf1b

  • SHA256

    91959918ef786aa57a8c1b4f84531582b5cfffd8ad3f4b6c6fe2a8d8bb88bc31

  • SHA512

    18f8a4d501c21f6c4aec39f874be7392ba5c21ff6e52121f8c15d501a25d29be6d7aeff5b92330efa400d96b8576f9408af23a29cbbba55c00e5076c7b2a5a41

  • SSDEEP

    1536:biukFa3X/rZvzvZhLWQuZNWAKxFN1GY5slGn+oO2pCeHi2VOBg2r/Muo262M:bg8/lvglGnO2NC2MB9r/X1LM

Malware Config

Targets

    • Target

      9397fe9df767ee51ed4b3847a4aa45a8_JaffaCakes118

    • Size

      136KB

    • MD5

      9397fe9df767ee51ed4b3847a4aa45a8

    • SHA1

      ce2a8b18dbb5b7bcda019b1ccc58049c923edf1b

    • SHA256

      91959918ef786aa57a8c1b4f84531582b5cfffd8ad3f4b6c6fe2a8d8bb88bc31

    • SHA512

      18f8a4d501c21f6c4aec39f874be7392ba5c21ff6e52121f8c15d501a25d29be6d7aeff5b92330efa400d96b8576f9408af23a29cbbba55c00e5076c7b2a5a41

    • SSDEEP

      1536:biukFa3X/rZvzvZhLWQuZNWAKxFN1GY5slGn+oO2pCeHi2VOBg2r/Muo262M:bg8/lvglGnO2NC2MB9r/X1LM

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks