General

  • Target

    b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118

  • Size

    88KB

  • Sample

    241130-fhq6natkft

  • MD5

    b4dd126a8a85297f6695d1e89f8a827b

  • SHA1

    888390b12724c4f7de484029b081cc5cd78d239d

  • SHA256

    e055346bbcea8acc879fc9ab7cc231658971d42f463c1a4a139a139fbbb95ac7

  • SHA512

    0c0c5899ff61b487469dad1a4348ef2ec7f8e04c6a21509c4165dd7f8864ead17360b9198c79c602123c5e3d31dfb7cc14bafa4245421be0c171aaf6d4791572

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEP:6D0ctAVA/bmxIMnoKjyR/NP

Malware Config

Targets

    • Target

      b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118

    • Size

      88KB

    • MD5

      b4dd126a8a85297f6695d1e89f8a827b

    • SHA1

      888390b12724c4f7de484029b081cc5cd78d239d

    • SHA256

      e055346bbcea8acc879fc9ab7cc231658971d42f463c1a4a139a139fbbb95ac7

    • SHA512

      0c0c5899ff61b487469dad1a4348ef2ec7f8e04c6a21509c4165dd7f8864ead17360b9198c79c602123c5e3d31dfb7cc14bafa4245421be0c171aaf6d4791572

    • SSDEEP

      1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEP:6D0ctAVA/bmxIMnoKjyR/NP

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks