General

  • Target

    cb6f017ca5a89826558df15389e78552_JaffaCakes118

  • Size

    13KB

  • Sample

    240830-xb6ffazdqn

  • MD5

    cb6f017ca5a89826558df15389e78552

  • SHA1

    5e8a5803953622afa2e8e7fb37685e639fb6111a

  • SHA256

    4548fff653a0b3b861dc75a1ddc04950d5bfadf9a9641c70fa5afd95cc962f97

  • SHA512

    79310bca777f54c797c154b6c8b3af2bb4a0cdbd7623b29f2bba15d4d4f93f424c090ce1ecccc23c92f8b868d65e088add60daf389a6c81c7c9f81b37300a81a

  • SSDEEP

    192:byEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:204Vfdj9JT9uxRgZGz0glhPuDWWx3f

Malware Config

Targets

    • Target

      cb6f017ca5a89826558df15389e78552_JaffaCakes118

    • Size

      13KB

    • MD5

      cb6f017ca5a89826558df15389e78552

    • SHA1

      5e8a5803953622afa2e8e7fb37685e639fb6111a

    • SHA256

      4548fff653a0b3b861dc75a1ddc04950d5bfadf9a9641c70fa5afd95cc962f97

    • SHA512

      79310bca777f54c797c154b6c8b3af2bb4a0cdbd7623b29f2bba15d4d4f93f424c090ce1ecccc23c92f8b868d65e088add60daf389a6c81c7c9f81b37300a81a

    • SSDEEP

      192:byEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:204Vfdj9JT9uxRgZGz0glhPuDWWx3f

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks