General

  • Target

    99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe

  • Size

    88KB

  • Sample

    241126-bls27swmhw

  • MD5

    7c28769f85f896d0831d1ab08ff4182b

  • SHA1

    efc1b2b2aeef83aad21302e97fcf976f9b6af357

  • SHA256

    99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db

  • SHA512

    1c3f97c8d6219dda494c168d96539d94c3028375d5695a28a26298e4ca3abb0f7a6bee1a8864a96f84a22354d19ca84fd149ebf0e94f13744a4fcbe270fa97a8

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEL:6D0ctAVA/bmxIMnoKjyR/NL

Malware Config

Targets

    • Target

      99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe

    • Size

      88KB

    • MD5

      7c28769f85f896d0831d1ab08ff4182b

    • SHA1

      efc1b2b2aeef83aad21302e97fcf976f9b6af357

    • SHA256

      99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db

    • SHA512

      1c3f97c8d6219dda494c168d96539d94c3028375d5695a28a26298e4ca3abb0f7a6bee1a8864a96f84a22354d19ca84fd149ebf0e94f13744a4fcbe270fa97a8

    • SSDEEP

      1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEL:6D0ctAVA/bmxIMnoKjyR/NL

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks