General

  • Target

    354692cc12def33967175296ad6584ac_JaffaCakes118

  • Size

    61KB

  • Sample

    241011-rsnztsxblf

  • MD5

    354692cc12def33967175296ad6584ac

  • SHA1

    ea1ab747a57a23baeec170f3baff634b72324c00

  • SHA256

    99b034ed3198bbec6ca0cfd8092e64a2f4c5ce8890a85089360ea1bbd9f36e4a

  • SHA512

    b0e9a43465ed92b122ebfde13ef9f72d2e1f16143853d0941f728cdb5236e36d4576a88a4468439e6f1aee424aef95208e6fc2b4e5c32e90b2e2156d84b036b7

  • SSDEEP

    1536:BI10SF4cpXCuQkKRfkkhFNnUvE4L5bgi/3hP4bIpA:BI1rskKBkcXn+LVgiV4a

Malware Config

Targets

    • Target

      354692cc12def33967175296ad6584ac_JaffaCakes118

    • Size

      61KB

    • MD5

      354692cc12def33967175296ad6584ac

    • SHA1

      ea1ab747a57a23baeec170f3baff634b72324c00

    • SHA256

      99b034ed3198bbec6ca0cfd8092e64a2f4c5ce8890a85089360ea1bbd9f36e4a

    • SHA512

      b0e9a43465ed92b122ebfde13ef9f72d2e1f16143853d0941f728cdb5236e36d4576a88a4468439e6f1aee424aef95208e6fc2b4e5c32e90b2e2156d84b036b7

    • SSDEEP

      1536:BI10SF4cpXCuQkKRfkkhFNnUvE4L5bgi/3hP4bIpA:BI1rskKBkcXn+LVgiV4a

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks