General

  • Target

    5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118

  • Size

    100KB

  • Sample

    241019-z4z58s1fmq

  • MD5

    5eb5e38603d450c1ef0c730f9de90779

  • SHA1

    d945f79cb88ff31ebb9219c78a49fa5918f60a4a

  • SHA256

    f393b70b83f103223498574539836accc99da3624b61fa3646354a10e9409292

  • SHA512

    87bbdf5e9c768160504f312a6ff3250882145156ed438c29c0b63ce2c026d9bc1f610ba07e87bd708f3259bc956b52a2e5af943a223333ffd5b01512355a376e

  • SSDEEP

    1536:vZtLvZKaCkk+t4kxDbV59JAWLYM0vdv8oTdDWeogndoHXPQT3jNwJLb:vPLvH4yR5Ph10vdf/oHqzatb

Malware Config

Targets

    • Target

      5eb5e38603d450c1ef0c730f9de90779_JaffaCakes118

    • Size

      100KB

    • MD5

      5eb5e38603d450c1ef0c730f9de90779

    • SHA1

      d945f79cb88ff31ebb9219c78a49fa5918f60a4a

    • SHA256

      f393b70b83f103223498574539836accc99da3624b61fa3646354a10e9409292

    • SHA512

      87bbdf5e9c768160504f312a6ff3250882145156ed438c29c0b63ce2c026d9bc1f610ba07e87bd708f3259bc956b52a2e5af943a223333ffd5b01512355a376e

    • SSDEEP

      1536:vZtLvZKaCkk+t4kxDbV59JAWLYM0vdv8oTdDWeogndoHXPQT3jNwJLb:vPLvH4yR5Ph10vdf/oHqzatb

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks