General

  • Target

    aa112af3bc012d4d0f0f6bd8b55b6dbeb190d864e8657c2728f87f58485fc319

  • Size

    616KB

  • Sample

    221001-3tggxscdg2

  • MD5

    a42b9f9872410d141ed43469c634a235

  • SHA1

    e8982c96e3224ea58d4926cb7e5fa7ff69371d8c

  • SHA256

    aa112af3bc012d4d0f0f6bd8b55b6dbeb190d864e8657c2728f87f58485fc319

  • SHA512

    4faf99952efa818a01ba7c8fe3303ef4bad9ca9a455b31a957a9d76ff4e3853b6d74c6d4e012cef3919d964b2e63fcf1898849f97234d22a21d20516fad39673

  • SSDEEP

    12288:k+ClfB2wO0Eh0FZQe86gnq9cNrS60UeSd+G1a9rf:FClfQwOlh6ZF86gnq9cgT36+GA9L

Malware Config

Targets

    • Target

      aa112af3bc012d4d0f0f6bd8b55b6dbeb190d864e8657c2728f87f58485fc319

    • Size

      616KB

    • MD5

      a42b9f9872410d141ed43469c634a235

    • SHA1

      e8982c96e3224ea58d4926cb7e5fa7ff69371d8c

    • SHA256

      aa112af3bc012d4d0f0f6bd8b55b6dbeb190d864e8657c2728f87f58485fc319

    • SHA512

      4faf99952efa818a01ba7c8fe3303ef4bad9ca9a455b31a957a9d76ff4e3853b6d74c6d4e012cef3919d964b2e63fcf1898849f97234d22a21d20516fad39673

    • SSDEEP

      12288:k+ClfB2wO0Eh0FZQe86gnq9cNrS60UeSd+G1a9rf:FClfQwOlh6ZF86gnq9cgT36+GA9L

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks