General

  • Target

    JaffaCakes118_4f19e5070057ebaab5fe2e45362696fb

  • Size

    87KB

  • Sample

    250304-xpvwvsxxgv

  • MD5

    4f19e5070057ebaab5fe2e45362696fb

  • SHA1

    0141745944da5a69c429cbc9b145548312e7954e

  • SHA256

    e241872fc445da8a130c7e67220d6201f40cc3b0adfaad15b7c617b977f5b96c

  • SHA512

    d123d1d453d93e3777f06015f24d6bac40a13dfd03e2ee1b7d9325754186e79d2939b9c75037fccb7751ac6712587e371a346c8517a1951aa7c48858417d64f8

  • SSDEEP

    384:83hBfvdN0ecFrsk8chpHF340+JNjSSN/Me4rY90sNGjsy+BLZBwdUrOJZz/F1pzu:KfMecZp9FPa2Std4MqE/ZydgWvXe

Malware Config

Targets

    • Target

      JaffaCakes118_4f19e5070057ebaab5fe2e45362696fb

    • Size

      87KB

    • MD5

      4f19e5070057ebaab5fe2e45362696fb

    • SHA1

      0141745944da5a69c429cbc9b145548312e7954e

    • SHA256

      e241872fc445da8a130c7e67220d6201f40cc3b0adfaad15b7c617b977f5b96c

    • SHA512

      d123d1d453d93e3777f06015f24d6bac40a13dfd03e2ee1b7d9325754186e79d2939b9c75037fccb7751ac6712587e371a346c8517a1951aa7c48858417d64f8

    • SSDEEP

      384:83hBfvdN0ecFrsk8chpHF340+JNjSSN/Me4rY90sNGjsy+BLZBwdUrOJZz/F1pzu:KfMecZp9FPa2Std4MqE/ZydgWvXe

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks