General

  • Target

    c1d13aeaca46aee7e2d4a5a74eed724b_JaffaCakes118

  • Size

    554KB

  • Sample

    241204-k14lxswlbk

  • MD5

    c1d13aeaca46aee7e2d4a5a74eed724b

  • SHA1

    09087b73137b6144c8eba215cc422e29740f771f

  • SHA256

    0764695550ee2b70a3997adee51d70bc8c203a395da12fb76c4ea3ba39fe310c

  • SHA512

    1db1789209524982de302c92e8e41fffe60cdb10e3ca5c87988e075e0df23bc3914ca96dce9b841e59a6a9dbcf69beb70d13c4b175a78c88b4bf59dc31c7cb73

  • SSDEEP

    12288:vvZ/dXAxT3vm1Gn+kCJWBXXo/DAz7iXPXSRZ+W/:vvhdkufk8WBHo/DM6PSRf

Malware Config

Targets

    • Target

      c1d13aeaca46aee7e2d4a5a74eed724b_JaffaCakes118

    • Size

      554KB

    • MD5

      c1d13aeaca46aee7e2d4a5a74eed724b

    • SHA1

      09087b73137b6144c8eba215cc422e29740f771f

    • SHA256

      0764695550ee2b70a3997adee51d70bc8c203a395da12fb76c4ea3ba39fe310c

    • SHA512

      1db1789209524982de302c92e8e41fffe60cdb10e3ca5c87988e075e0df23bc3914ca96dce9b841e59a6a9dbcf69beb70d13c4b175a78c88b4bf59dc31c7cb73

    • SSDEEP

      12288:vvZ/dXAxT3vm1Gn+kCJWBXXo/DAz7iXPXSRZ+W/:vvhdkufk8WBHo/DM6PSRf

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks