General

  • Target

    ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e

  • Size

    284KB

  • Sample

    241106-clafjasgre

  • MD5

    09f995ad2c1bf8aa7934744ff2035594

  • SHA1

    4106f6ef3ce2a6f609c5c17cd1d9b2f36d76594b

  • SHA256

    ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e

  • SHA512

    5653802d21e52221cfccf529ab553f4d6c3ac204856b5f19ee6e7971bb0bc480e21be671f8f95412e351981d23c7871da0a82bd1f1454166d07f7e85dfb463ce

  • SSDEEP

    3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l

Malware Config

Targets

    • Target

      ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e

    • Size

      284KB

    • MD5

      09f995ad2c1bf8aa7934744ff2035594

    • SHA1

      4106f6ef3ce2a6f609c5c17cd1d9b2f36d76594b

    • SHA256

      ac0edd92f30b6a374e9f59b6f5c3e82f2684def5938de70569cb81c4efd6571e

    • SHA512

      5653802d21e52221cfccf529ab553f4d6c3ac204856b5f19ee6e7971bb0bc480e21be671f8f95412e351981d23c7871da0a82bd1f1454166d07f7e85dfb463ce

    • SSDEEP

      3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks