General

  • Target

    952a40dfa4450d1375c66f67f477066b39cb8ce355e3714e83eba2b03726942f.exe

  • Size

    380KB

  • Sample

    241202-kmwn6atlbp

  • MD5

    b10fd5012915f720be688ca56a146373

  • SHA1

    8a48715503b9396bbdcfc89373135bbcfb62c884

  • SHA256

    952a40dfa4450d1375c66f67f477066b39cb8ce355e3714e83eba2b03726942f

  • SHA512

    2c3407739187d17ef42fec434e70bcec6cad20b5a2a1e295d8cccd5f725b3c71ce37ee60c9b817c4577b225f0f975c0032db4d9b4c77cbcb259c0c29a01ec43f

  • SSDEEP

    6144:Y5GBJTHM/Sht2gjFjJ0S9nYtluxpMfbgJM1MVh9Za5fk3loiS:WuTHM/Shtn1SluxM2VHEuoiS

Malware Config

Targets

    • Target

      952a40dfa4450d1375c66f67f477066b39cb8ce355e3714e83eba2b03726942f.exe

    • Size

      380KB

    • MD5

      b10fd5012915f720be688ca56a146373

    • SHA1

      8a48715503b9396bbdcfc89373135bbcfb62c884

    • SHA256

      952a40dfa4450d1375c66f67f477066b39cb8ce355e3714e83eba2b03726942f

    • SHA512

      2c3407739187d17ef42fec434e70bcec6cad20b5a2a1e295d8cccd5f725b3c71ce37ee60c9b817c4577b225f0f975c0032db4d9b4c77cbcb259c0c29a01ec43f

    • SSDEEP

      6144:Y5GBJTHM/Sht2gjFjJ0S9nYtluxpMfbgJM1MVh9Za5fk3loiS:WuTHM/Shtn1SluxM2VHEuoiS

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks