General

  • Target

    72390fc7e5134c33bb99fa5cc3ef132a_JaffaCakes118

  • Size

    13KB

  • Sample

    241024-ehtfcatblf

  • MD5

    72390fc7e5134c33bb99fa5cc3ef132a

  • SHA1

    858e226a75dee2789ffdbb60e2dae38c1440c157

  • SHA256

    24986dc57e5c2fce036e988a8f8f3f39ddc9df8a32e13b02b1e51d1a653d9a55

  • SHA512

    4baae5612b61544ac63418e0734d4e9882a0495d613449c1cfd9612267199946c854599a55b3810bc586f2b49dbcfa20189bed66fbd522f6388b4a319a4bad58

  • SSDEEP

    384:rLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:4Sagh0Qu1UkKE7AF

Malware Config

Targets

    • Target

      72390fc7e5134c33bb99fa5cc3ef132a_JaffaCakes118

    • Size

      13KB

    • MD5

      72390fc7e5134c33bb99fa5cc3ef132a

    • SHA1

      858e226a75dee2789ffdbb60e2dae38c1440c157

    • SHA256

      24986dc57e5c2fce036e988a8f8f3f39ddc9df8a32e13b02b1e51d1a653d9a55

    • SHA512

      4baae5612b61544ac63418e0734d4e9882a0495d613449c1cfd9612267199946c854599a55b3810bc586f2b49dbcfa20189bed66fbd522f6388b4a319a4bad58

    • SSDEEP

      384:rLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:4Sagh0Qu1UkKE7AF

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks