General

  • Target

    240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacdN

  • Size

    317KB

  • Sample

    241102-n7288atgjr

  • MD5

    415b52543a92106f55796f445f880750

  • SHA1

    0ebd987235e5a22f132908895b1a858a4586b18b

  • SHA256

    240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacd

  • SHA512

    253d7ae1d158fe351da72694d182ab346c35a2923a0aa4fedd8da2a475dd741b8e31eb12cdc89074591283db3b3d11e1a36b8f35429187bdfac2e99782bda817

  • SSDEEP

    3072:vSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:vPA6wxmuJspr2lb6

Malware Config

Targets

    • Target

      240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacdN

    • Size

      317KB

    • MD5

      415b52543a92106f55796f445f880750

    • SHA1

      0ebd987235e5a22f132908895b1a858a4586b18b

    • SHA256

      240174d446dcde189dff27555ee0fe34620e482e0fc7e3b92f8b7261c6c3dacd

    • SHA512

      253d7ae1d158fe351da72694d182ab346c35a2923a0aa4fedd8da2a475dd741b8e31eb12cdc89074591283db3b3d11e1a36b8f35429187bdfac2e99782bda817

    • SSDEEP

      3072:vSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:vPA6wxmuJspr2lb6

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks