General

  • Target

    57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.zip

  • Size

    91KB

  • Sample

    240904-h651tsxfne

  • MD5

    b1fceb117ac59877219f44e890a9c65a

  • SHA1

    4bfd17dc3097f9efe6e30b7273a8736921de1431

  • SHA256

    19d54644787bfe38031a1e670be4aec6dbb23431a19d8f59b7c60339e99088e9

  • SHA512

    60b067aa7092af2d31f7e24d2905356463efc2e1299c2ff900edf963e1f063f29aadf5d5f453b3e1566e67af698115d03aa970ec5dd41bc0ea67c717dbd81eac

  • SSDEEP

    1536:vyzbF0H2K2sRWSj5NxY0E5qroMoYiDXD+99JjGAKzrea7w4KjOJS:ix02CRWau0toYUS99QADCYOA

Malware Config

Targets

    • Target

      57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe

    • Size

      392KB

    • MD5

      9e9818f5a14d0ff1b45d75493930695f

    • SHA1

      f7a7f1d59adb83febc9a75e6ba68003946025923

    • SHA256

      57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62

    • SHA512

      cbb07fb22c629fa30f79f7fdccb316df78b244d4d36f346a03ebfd90862e3338b79fbf4d2c9eeeb512eb5ab12d54a88a5578d16c7719e8ad9c1c3c5fe4b45dd5

    • SSDEEP

      3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks