General

  • Target

    57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.zip

  • Size

    91KB

  • Sample

    250114-m6v8vawpdw

  • MD5

    e34225705c5d6c48849f2aedecfcae61

  • SHA1

    258634ab1e5a5ede357324a762200a1ad0be69e4

  • SHA256

    9c74e1c18c2f7056010933362bc035923469d71016c8babbaaa5d2eae626836f

  • SHA512

    9e1badaf8e58b8c6b046658be91f2783d0bea6f144e0cb0496af932999287794ad9834673a178ad3b694d0782161bfb36139d0f34a8f6a41c57a5397a3588ceb

  • SSDEEP

    1536:BHkY1AOTBOVz5FOl/KnGjE4mCqzVFZjee4TMiNpn7l+O2iXJ9jBX7aGbXh8J:BHz6gBOhPeSfjefVr7l+hU7Fh8J

Malware Config

Targets

    • Target

      57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62.exe

    • Size

      392KB

    • MD5

      9e9818f5a14d0ff1b45d75493930695f

    • SHA1

      f7a7f1d59adb83febc9a75e6ba68003946025923

    • SHA256

      57ab710f4f52fb571cd0e1e9c2478c38717fe95fcc9f7c5ba2f3a796fc339b62

    • SHA512

      cbb07fb22c629fa30f79f7fdccb316df78b244d4d36f346a03ebfd90862e3338b79fbf4d2c9eeeb512eb5ab12d54a88a5578d16c7719e8ad9c1c3c5fe4b45dd5

    • SSDEEP

      3072:V+ESQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lbaV2:DPA6wxmuJspr2lb6

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks