General

  • Target

    3cca89a4ea131049cb014bd902fbc046_JaffaCakes118

  • Size

    317KB

  • Sample

    241013-ak7njatdmk

  • MD5

    3cca89a4ea131049cb014bd902fbc046

  • SHA1

    26cd82b7e197cea2a54ea5fddc586838a7e48d97

  • SHA256

    e8b0771b9473dd8fbb79a88026555a03ae9e95b2a9098cceb1f78e0ea1e49324

  • SHA512

    ffebdcd16d69fcb47057c7682d0813e9c8a37d5e6fa10f70914666b7afce56570317074f9508b41179dd81c24b4f5a2453daff6cc0efd046b8d136cd713593b3

  • SSDEEP

    6144:TDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxIInDMTaF2:TNSPB1PDbKk7Lq4mbInwTs2

Malware Config

Targets

    • Target

      3cca89a4ea131049cb014bd902fbc046_JaffaCakes118

    • Size

      317KB

    • MD5

      3cca89a4ea131049cb014bd902fbc046

    • SHA1

      26cd82b7e197cea2a54ea5fddc586838a7e48d97

    • SHA256

      e8b0771b9473dd8fbb79a88026555a03ae9e95b2a9098cceb1f78e0ea1e49324

    • SHA512

      ffebdcd16d69fcb47057c7682d0813e9c8a37d5e6fa10f70914666b7afce56570317074f9508b41179dd81c24b4f5a2453daff6cc0efd046b8d136cd713593b3

    • SSDEEP

      6144:TDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxIInDMTaF2:TNSPB1PDbKk7Lq4mbInwTs2

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks