General

  • Target

    JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6

  • Size

    91KB

  • Sample

    250320-p3kn2sxjw4

  • MD5

    82eb93f4f3e8250cd307f55418f8a9b6

  • SHA1

    eb8b11f863eaa2a40b14ece6f88a2644b7490291

  • SHA256

    2f1519d567095f6995dbfb26a69e1dfffae2d9b17ef8ad1f96a22ce1d90764ff

  • SHA512

    1e41c41265f12e599496eed5215cb2424cb11b8c34bf32a6bba637ea8d37f4b3fb90e0edc0a01a081010393b093736d9eb3a6abaa3c090e6b1c43a496d0b5248

  • SSDEEP

    1536:gP43Ktdr6DpSAbcDL7HU4bFXQb2T2J9999939999ZRYeX5rG7M1999999999999s:gP43Ktdr0SAbcDLDU4bFXTiJ9999939m

Malware Config

Targets

    • Target

      JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6

    • Size

      91KB

    • MD5

      82eb93f4f3e8250cd307f55418f8a9b6

    • SHA1

      eb8b11f863eaa2a40b14ece6f88a2644b7490291

    • SHA256

      2f1519d567095f6995dbfb26a69e1dfffae2d9b17ef8ad1f96a22ce1d90764ff

    • SHA512

      1e41c41265f12e599496eed5215cb2424cb11b8c34bf32a6bba637ea8d37f4b3fb90e0edc0a01a081010393b093736d9eb3a6abaa3c090e6b1c43a496d0b5248

    • SSDEEP

      1536:gP43Ktdr6DpSAbcDL7HU4bFXQb2T2J9999939999ZRYeX5rG7M1999999999999s:gP43Ktdr0SAbcDLDU4bFXTiJ9999939m

    • Andromeda family

    • Andromeda, Gamarue

      Andromeda, also known as Gamarue, is a modular botnet malware primarily used for distributing other types of malware and it's written in C++.

    • Detects Andromeda payload.

    • Adds policy Run key to start application

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks