General

  • Target

    JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2

  • Size

    156KB

  • Sample

    250226-z5vxxatsh1

  • MD5

    28a55957354bdb37eaa7dff333d74ef2

  • SHA1

    b0919f10770d453c4c6b2c5bb0a8f232a698abe7

  • SHA256

    03c819aefb5839a29d3e7cc7d6873e6567a6f6fc5838d9ecc0148888a9a25c5e

  • SHA512

    4e23d901916e5f580a78194a3eb76b02a16c9df9cb46b62af6a99adc85dce80d4c4ebc15f9f4a93b33166922d09507c8514c985cea96a2d71b7b5bc60bd6f79e

  • SSDEEP

    3072:golhK8sqT6MM6MMMMMMMMM2kxYJ+ipeq1u4oTsZlgghZ+SlnopAqcKzkAwLNe54/:gondu4ogr7+KopAqc68HvsK

Malware Config

Targets

    • Target

      JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2

    • Size

      156KB

    • MD5

      28a55957354bdb37eaa7dff333d74ef2

    • SHA1

      b0919f10770d453c4c6b2c5bb0a8f232a698abe7

    • SHA256

      03c819aefb5839a29d3e7cc7d6873e6567a6f6fc5838d9ecc0148888a9a25c5e

    • SHA512

      4e23d901916e5f580a78194a3eb76b02a16c9df9cb46b62af6a99adc85dce80d4c4ebc15f9f4a93b33166922d09507c8514c985cea96a2d71b7b5bc60bd6f79e

    • SSDEEP

      3072:golhK8sqT6MM6MMMMMMMMM2kxYJ+ipeq1u4oTsZlgghZ+SlnopAqcKzkAwLNe54/:gondu4ogr7+KopAqc68HvsK

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks