General

  • Target

    4e185afb3f77b2fc00b0a4c6d8c23ef1b8f1ce52d6b1d366a64bec98b058a5a9N

  • Size

    61KB

  • Sample

    241107-hzzkgazreq

  • MD5

    8df4ef006d5fcabeebdb27326f1b7ff0

  • SHA1

    a0c5b507d02714dc968c26a106a4baa2683f07f7

  • SHA256

    4e185afb3f77b2fc00b0a4c6d8c23ef1b8f1ce52d6b1d366a64bec98b058a5a9

  • SHA512

    a02993fb70e06a9ed094d1dd6dd15a2c6eac99594b67b8163501eefc630649416c4715c9e72d2f018efb70621eff639f9f4e3093f6b23eeaff90d400a16b433b

  • SSDEEP

    1536:QB27hZMls+WZ7wmzqltdQJWko1ccMGzBN/IJE9Conj:QWHMBWZ7fGtqwtLV+E9/

Malware Config

Targets

    • Target

      4e185afb3f77b2fc00b0a4c6d8c23ef1b8f1ce52d6b1d366a64bec98b058a5a9N

    • Size

      61KB

    • MD5

      8df4ef006d5fcabeebdb27326f1b7ff0

    • SHA1

      a0c5b507d02714dc968c26a106a4baa2683f07f7

    • SHA256

      4e185afb3f77b2fc00b0a4c6d8c23ef1b8f1ce52d6b1d366a64bec98b058a5a9

    • SHA512

      a02993fb70e06a9ed094d1dd6dd15a2c6eac99594b67b8163501eefc630649416c4715c9e72d2f018efb70621eff639f9f4e3093f6b23eeaff90d400a16b433b

    • SSDEEP

      1536:QB27hZMls+WZ7wmzqltdQJWko1ccMGzBN/IJE9Conj:QWHMBWZ7fGtqwtLV+E9/

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks