General

  • Target

    ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb

  • Size

    392KB

  • Sample

    241107-d8frhavdjh

  • MD5

    bc7581c0bab4d516c84d22d10b886356

  • SHA1

    e2f733481cde3cb604b6cb6fa53d887c90f3a7f2

  • SHA256

    ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb

  • SHA512

    33b6a227c56989052483446c2cbc1c5ec68b604b2c7097d711493aeaf6fce64dee8f2aceef99a472b9d242aaafc62fb133485d45af97cdc935ba3abf4436e1fe

  • SSDEEP

    3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6

Malware Config

Targets

    • Target

      ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb

    • Size

      392KB

    • MD5

      bc7581c0bab4d516c84d22d10b886356

    • SHA1

      e2f733481cde3cb604b6cb6fa53d887c90f3a7f2

    • SHA256

      ba1e251c92e1979948041a7141f47d1221e0fa64c3be354ddb8bc06b200aa4cb

    • SHA512

      33b6a227c56989052483446c2cbc1c5ec68b604b2c7097d711493aeaf6fce64dee8f2aceef99a472b9d242aaafc62fb133485d45af97cdc935ba3abf4436e1fe

    • SSDEEP

      3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks