General

  • Target

    2eb43719e9795f9d4a3678809032ad40_JaffaCakes118

  • Size

    36KB

  • Sample

    241009-lgdf3aydlg

  • MD5

    2eb43719e9795f9d4a3678809032ad40

  • SHA1

    afd6b3f741db664ee77b42fa6b41f0606b564f42

  • SHA256

    61e96058d5979cd4ac9c8fa1b3070369152c5f1eb971bc0da38e0743d5261cc5

  • SHA512

    f89562527b8e0feb5956a261d7456b33db2e92b0fb3d5a13816f90e63a9f83561f0245f43d5d26350f46de4114abeee20227e6ffcf8e8b8ee0ceeeaf0d9afdad

  • SSDEEP

    768:/BT/H3K6h8I+Cnf0+zRweP7JcaIktRbwYM4E:Na6hr+Cnc+zRwoizkTbwYVE

Malware Config

Targets

    • Target

      2eb43719e9795f9d4a3678809032ad40_JaffaCakes118

    • Size

      36KB

    • MD5

      2eb43719e9795f9d4a3678809032ad40

    • SHA1

      afd6b3f741db664ee77b42fa6b41f0606b564f42

    • SHA256

      61e96058d5979cd4ac9c8fa1b3070369152c5f1eb971bc0da38e0743d5261cc5

    • SHA512

      f89562527b8e0feb5956a261d7456b33db2e92b0fb3d5a13816f90e63a9f83561f0245f43d5d26350f46de4114abeee20227e6ffcf8e8b8ee0ceeeaf0d9afdad

    • SSDEEP

      768:/BT/H3K6h8I+Cnf0+zRweP7JcaIktRbwYM4E:Na6hr+Cnc+zRwoizkTbwYVE

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks