General

  • Target

    b28faa31ad92fa1067cc6d674e2a988b_JaffaCakes118

  • Size

    77KB

  • Sample

    241129-t9vj2swmaw

  • MD5

    b28faa31ad92fa1067cc6d674e2a988b

  • SHA1

    8d235d95ae300ebb757d7cee429316b5b10df0f4

  • SHA256

    e908ef053758fdd786f405ec28428dc246310bf735f89e802c1772f3efd988bc

  • SHA512

    e70c0135f314c124e6145fd91581349a8dd485cd0203a9bf7254032aadb84f1338f635a57601c8240b34514d9163bb980eb352478ea4495981f40cc454e25287

  • SSDEEP

    768:Rc+6k/ywcONDBrPangBVaPrZS/kgC6rc4XBZKbd1y/3BTz91gIMHwfiQBlqXun2Q:yqcONQ4R8A2HwVqwKfixNn

Malware Config

Targets

    • Target

      BBB report.exe

    • Size

      49KB

    • MD5

      0a639fab96cc0517efaaa476b2bbbcc2

    • SHA1

      f351d57e0fd8e5e54ac92f5739d87239ee22ebdf

    • SHA256

      e4d9b77dc0c6a90f27442a8a817593aced65e274cfecdedff1ffb4a6f118ff49

    • SHA512

      95616c97675da315532c78b361443ccf67523ec29dc0d7627a8a96bf2e68aaf15e408e183ab1cc45223d2140d69cff72c170e1deaeae6601dc6f9eab878cf062

    • SSDEEP

      768:ReK7M/8VNUef7eW7jzMAhqCB0u00aY3GM1JpOKn1lDTew:Y/8NUaf7huGGqHJT

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks