General

  • Target

    JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8

  • Size

    54KB

  • Sample

    250309-z4b4ea1qw6

  • MD5

    5b4e5e444ee2e388e0bf6e65c23fbbf8

  • SHA1

    596a7597a26a01d90d1c71b6c26570e2fa8a4a8e

  • SHA256

    b5d1bd6e0e12a8efc77b19e9a41007640738d5f9289edede252a14cd6e1c5e24

  • SHA512

    80ab0fb905c1b2f0dbfa2a05c05723485881d463570408b5a47384df262090111607095e11eee8b2889b61f5c8d1e64726acaacf3eb9b93a6523e6bc367e836c

  • SSDEEP

    768:/vWqjOJZcEG8uni2h4HpiuDEDmAnYhEM2cmnN50w5rEwMrboCbH0MAiZI:78ZcE7sCg6oX50w5rT7C4iZI

Malware Config

Targets

    • Target

      JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8

    • Size

      54KB

    • MD5

      5b4e5e444ee2e388e0bf6e65c23fbbf8

    • SHA1

      596a7597a26a01d90d1c71b6c26570e2fa8a4a8e

    • SHA256

      b5d1bd6e0e12a8efc77b19e9a41007640738d5f9289edede252a14cd6e1c5e24

    • SHA512

      80ab0fb905c1b2f0dbfa2a05c05723485881d463570408b5a47384df262090111607095e11eee8b2889b61f5c8d1e64726acaacf3eb9b93a6523e6bc367e836c

    • SSDEEP

      768:/vWqjOJZcEG8uni2h4HpiuDEDmAnYhEM2cmnN50w5rEwMrboCbH0MAiZI:78ZcE7sCg6oX50w5rT7C4iZI

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks