General

  • Target

    c2c3e3db4afae95551bffe0dfa9c37620f5bba5c09614e2062b0fb28a3502a23

  • Size

    203KB

  • Sample

    241005-db7hys1dpp

  • MD5

    37867fa6cd76612d48faef8e95ab75c6

  • SHA1

    09bc808bc275220bb4767b1bbf86ccfff5075e3f

  • SHA256

    c2c3e3db4afae95551bffe0dfa9c37620f5bba5c09614e2062b0fb28a3502a23

  • SHA512

    62d73f9e96ece8d12eb6bd760d461b1115f475f17d2c3e5297f694e694a9e16c8890b3efadebd4c3f961e8fbf623a71c84192fdb36fd9e36f9aec5e63801fd11

  • SSDEEP

    3072:/Bb4M+rlz9GMSu3oHWWH1+cmm/foQnNtH5LcRQsq0d9HZP+aATcOBHV:/14RzUNsYN1B9nX9Ud9HoI21

Malware Config

Targets

    • Target

      c2c3e3db4afae95551bffe0dfa9c37620f5bba5c09614e2062b0fb28a3502a23

    • Size

      203KB

    • MD5

      37867fa6cd76612d48faef8e95ab75c6

    • SHA1

      09bc808bc275220bb4767b1bbf86ccfff5075e3f

    • SHA256

      c2c3e3db4afae95551bffe0dfa9c37620f5bba5c09614e2062b0fb28a3502a23

    • SHA512

      62d73f9e96ece8d12eb6bd760d461b1115f475f17d2c3e5297f694e694a9e16c8890b3efadebd4c3f961e8fbf623a71c84192fdb36fd9e36f9aec5e63801fd11

    • SSDEEP

      3072:/Bb4M+rlz9GMSu3oHWWH1+cmm/foQnNtH5LcRQsq0d9HZP+aATcOBHV:/14RzUNsYN1B9nX9Ud9HoI21

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks