General

  • Target

    d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4dN.exe

  • Size

    88KB

  • Sample

    241125-z6wwlawrgz

  • MD5

    1cc35d718c37a05e58e2362d7b08e750

  • SHA1

    a15b3a0d374b3940fc0caeb0b3471db1f8bfbb02

  • SHA256

    d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4d

  • SHA512

    1eea14d12d994f442cbe47f767ddbc78684e22f687894c0d210a969bf80f952e31362ba9190b50278f4ba14862cc215941ddd0c97ee5fa2649ed9b45ca427705

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEh:6D0ctAVA/bmxIMnoKjyR/Nh

Malware Config

Targets

    • Target

      d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4dN.exe

    • Size

      88KB

    • MD5

      1cc35d718c37a05e58e2362d7b08e750

    • SHA1

      a15b3a0d374b3940fc0caeb0b3471db1f8bfbb02

    • SHA256

      d0ed1d05f592cd0329c630f25ab242a03ec75a337e374785db127cd1738d8f4d

    • SHA512

      1eea14d12d994f442cbe47f767ddbc78684e22f687894c0d210a969bf80f952e31362ba9190b50278f4ba14862cc215941ddd0c97ee5fa2649ed9b45ca427705

    • SSDEEP

      1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEh:6D0ctAVA/bmxIMnoKjyR/Nh

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks