General

  • Target

    39469c5f4c7e171f4b39e5241842b0d15ae2aabbb2166421f07668c70931a81e.exe

  • Size

    188KB

  • Sample

    241204-czhztsxkev

  • MD5

    b027360320ed8fc2a475c42caa662b30

  • SHA1

    4ca7374ad9a0dff86f5ae995ea1f0f551298aeff

  • SHA256

    39469c5f4c7e171f4b39e5241842b0d15ae2aabbb2166421f07668c70931a81e

  • SHA512

    09d017c3ca8ae7ed52652c90c088ebfabe978e5f4de8bbb968d8eba8de90343a6585fe40e12022e2dd670bd727d0f204e9f8d15e3241fcde310afab8a660c28a

  • SSDEEP

    3072:FW+1oS4l5OeuQdrmwvL8EqL0WTb6mw6erykkA+qiD0WR48pEjGbs4Eo6R6FB6e1d:Ffwl5IQdyfEFkA+qiD0WR48pEjGbsbCr

Malware Config

Targets

    • Target

      39469c5f4c7e171f4b39e5241842b0d15ae2aabbb2166421f07668c70931a81e.exe

    • Size

      188KB

    • MD5

      b027360320ed8fc2a475c42caa662b30

    • SHA1

      4ca7374ad9a0dff86f5ae995ea1f0f551298aeff

    • SHA256

      39469c5f4c7e171f4b39e5241842b0d15ae2aabbb2166421f07668c70931a81e

    • SHA512

      09d017c3ca8ae7ed52652c90c088ebfabe978e5f4de8bbb968d8eba8de90343a6585fe40e12022e2dd670bd727d0f204e9f8d15e3241fcde310afab8a660c28a

    • SSDEEP

      3072:FW+1oS4l5OeuQdrmwvL8EqL0WTb6mw6erykkA+qiD0WR48pEjGbs4Eo6R6FB6e1d:Ffwl5IQdyfEFkA+qiD0WR48pEjGbsbCr

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks