General

  • Target

    691aa82b91b626470e41232c3e207170N.exe

  • Size

    13KB

  • Sample

    240823-xydnya1gld

  • MD5

    691aa82b91b626470e41232c3e207170

  • SHA1

    78cb61340318a2e38e349ae721a7da0d4365e99b

  • SHA256

    f7ad9a4635683d038f53164feea9d3cf1cf8c59632c91f7b2dcfe329c0b47789

  • SHA512

    4e71fa835c4408c6b78435f030794ab72e05c736eac1d48cf6eb3f7f98aefa48e98f4504e43d906b0905fdb53364b37de5ba81bbf53afe659c9ba8e2ae1706bb

  • SSDEEP

    384:YLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:5Sagh0Qu1UkKE7AF

Malware Config

Targets

    • Target

      691aa82b91b626470e41232c3e207170N.exe

    • Size

      13KB

    • MD5

      691aa82b91b626470e41232c3e207170

    • SHA1

      78cb61340318a2e38e349ae721a7da0d4365e99b

    • SHA256

      f7ad9a4635683d038f53164feea9d3cf1cf8c59632c91f7b2dcfe329c0b47789

    • SHA512

      4e71fa835c4408c6b78435f030794ab72e05c736eac1d48cf6eb3f7f98aefa48e98f4504e43d906b0905fdb53364b37de5ba81bbf53afe659c9ba8e2ae1706bb

    • SSDEEP

      384:YLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:5Sagh0Qu1UkKE7AF

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks