General

  • Target

    4dc09db34e4667bb238eaae25c8a08afa07a9c0c8ba67113399d455473f9bf96N.exe

  • Size

    226KB

  • Sample

    241111-cl4dlszflk

  • MD5

    6275dbf80e0e6cfb3b0903c344f27447

  • SHA1

    fcdf8aa513ae48ec30afbe6cda8def8baf2d41c7

  • SHA256

    eb68ccb475695c9cdebe6cfa02cedab4e6f19ae6b8276fe11889a1e5f3181e3c

  • SHA512

    9bdd301c77a0d02281925faf570791313b91bf740ce27a8e136fff155bc418b6595fbc1933f17fdf7218bc6607c61f052db32a264a8c74b9d0f2958909c42ff3

  • SSDEEP

    3072:/Bb4M+rlz9GMSu3oHWWH1+cmm/foQnNtH5LcRQsq0d9Hp977p3jCtd:/14RzUNsYN1B9nX9Ud9HjfwP

Malware Config

Targets

    • Target

      4dc09db34e4667bb238eaae25c8a08afa07a9c0c8ba67113399d455473f9bf96N.exe

    • Size

      226KB

    • MD5

      6275dbf80e0e6cfb3b0903c344f27447

    • SHA1

      fcdf8aa513ae48ec30afbe6cda8def8baf2d41c7

    • SHA256

      eb68ccb475695c9cdebe6cfa02cedab4e6f19ae6b8276fe11889a1e5f3181e3c

    • SHA512

      9bdd301c77a0d02281925faf570791313b91bf740ce27a8e136fff155bc418b6595fbc1933f17fdf7218bc6607c61f052db32a264a8c74b9d0f2958909c42ff3

    • SSDEEP

      3072:/Bb4M+rlz9GMSu3oHWWH1+cmm/foQnNtH5LcRQsq0d9Hp977p3jCtd:/14RzUNsYN1B9nX9Ud9HjfwP

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks