General

  • Target

    4a7b46f1c5092c0cae6f174fe7364036_JaffaCakes118

  • Size

    42KB

  • Sample

    241015-3fnn3swhpk

  • MD5

    4a7b46f1c5092c0cae6f174fe7364036

  • SHA1

    6f9a1d4d2edb25539cfa089771708414a4cc50dd

  • SHA256

    13832b0c76299308f8dae6f87657e427182fff19f5e706d0d12bd31eb21371a2

  • SHA512

    935eb14771dca736d0bf4056e79dd6941b20182ce65c0bad724d0558cdca5337c2e748c9fa1628538c65ab9cf3e5d19782ac7191d9e8f2453665ec9c965cee43

  • SSDEEP

    768:9dfTIv/kFdCp08vaJkDCBMLKIZqlpNymBWth:9pIv/sdCpztaMLbZrth

Malware Config

Targets

    • Target

      4a7b46f1c5092c0cae6f174fe7364036_JaffaCakes118

    • Size

      42KB

    • MD5

      4a7b46f1c5092c0cae6f174fe7364036

    • SHA1

      6f9a1d4d2edb25539cfa089771708414a4cc50dd

    • SHA256

      13832b0c76299308f8dae6f87657e427182fff19f5e706d0d12bd31eb21371a2

    • SHA512

      935eb14771dca736d0bf4056e79dd6941b20182ce65c0bad724d0558cdca5337c2e748c9fa1628538c65ab9cf3e5d19782ac7191d9e8f2453665ec9c965cee43

    • SSDEEP

      768:9dfTIv/kFdCp08vaJkDCBMLKIZqlpNymBWth:9pIv/sdCpztaMLbZrth

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks