General

  • Target

    5abee81069d33474c35bef0f151c58d5_JaffaCakes118

  • Size

    13KB

  • Sample

    241019-elpassyajq

  • MD5

    5abee81069d33474c35bef0f151c58d5

  • SHA1

    53b26d64719dbd01e1868f5e617f78bdd4fae9c7

  • SHA256

    fb3eb44093b525f5b1c0c4b71d67729c9f338455672fabfcc33f389975d0dd76

  • SHA512

    334673f2193f6397e52e477390faa8e0949719cd4689c4dc4ff17f138212210d9035449a7b26fdb89406989a152124dc81dfceee4a84d0df554830ba28b8e4b7

  • SSDEEP

    192:3yEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:C04Vfdj9JT9uxRgZGz0glhPuDWWx3f

Malware Config

Targets

    • Target

      5abee81069d33474c35bef0f151c58d5_JaffaCakes118

    • Size

      13KB

    • MD5

      5abee81069d33474c35bef0f151c58d5

    • SHA1

      53b26d64719dbd01e1868f5e617f78bdd4fae9c7

    • SHA256

      fb3eb44093b525f5b1c0c4b71d67729c9f338455672fabfcc33f389975d0dd76

    • SHA512

      334673f2193f6397e52e477390faa8e0949719cd4689c4dc4ff17f138212210d9035449a7b26fdb89406989a152124dc81dfceee4a84d0df554830ba28b8e4b7

    • SSDEEP

      192:3yEh4bJlnNdEIv1J/b9i7s4pwrARgZd1SrMksXgUdBOvAUPuDtwFWx3f/:C04Vfdj9JT9uxRgZGz0glhPuDWWx3f

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks