General

  • Target

    bd28ba7997f9314c6f894c985f2659c4_JaffaCakes118

  • Size

    50KB

  • Sample

    240823-zyandswfnd

  • MD5

    bd28ba7997f9314c6f894c985f2659c4

  • SHA1

    bfc134580872c964578b8a08263e3a15a04b18a8

  • SHA256

    891c73a065c10910e108957ae05d49b426fbcc3e7d13497fd756bc9cfa71054c

  • SHA512

    1132caa6999087e0025b527e7c42bf11c20389babdafed98b434613d3e07d1d4cd00a45d674063a699d4939fc151de817103f1154cb0381e573965b8d9c1440d

  • SSDEEP

    1536:iQdIYzq+5hRpfvm7ggHQX6eSpIkbEXZhV+8CYZZdK/Lm:iQdRgy6jihXZhJndWLm

Malware Config

Targets

    • Target

      bd28ba7997f9314c6f894c985f2659c4_JaffaCakes118

    • Size

      50KB

    • MD5

      bd28ba7997f9314c6f894c985f2659c4

    • SHA1

      bfc134580872c964578b8a08263e3a15a04b18a8

    • SHA256

      891c73a065c10910e108957ae05d49b426fbcc3e7d13497fd756bc9cfa71054c

    • SHA512

      1132caa6999087e0025b527e7c42bf11c20389babdafed98b434613d3e07d1d4cd00a45d674063a699d4939fc151de817103f1154cb0381e573965b8d9c1440d

    • SSDEEP

      1536:iQdIYzq+5hRpfvm7ggHQX6eSpIkbEXZhV+8CYZZdK/Lm:iQdRgy6jihXZhJndWLm

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks