General

  • Target

    fa8b6bb4cb6d79361cf262af2a49d107_JaffaCakes118

  • Size

    484KB

  • Sample

    240419-r9rgaaga6z

  • MD5

    fa8b6bb4cb6d79361cf262af2a49d107

  • SHA1

    149dc01745056d2879a042f6439c67926a7578e4

  • SHA256

    47c3ef34e5af85b3c37bb213c9e1916ed4d510f372886b88cc8e06dd612eac7c

  • SHA512

    cc69c684099fa18d9014927aac661136e0c4f303c61f0c6cb77aa1dbb6cf40973f3034f19f492193d48f047eb14931b5a482dc24c65d68bf4e628544e0e9a40e

  • SSDEEP

    12288:aths4juzSfHys+1f1dVCtPsqc8v5qMd96YJcEpX2bP:gs4juzSfv+qtLc8v5DH6sX2bP

Malware Config

Targets

    • Target

      fa8b6bb4cb6d79361cf262af2a49d107_JaffaCakes118

    • Size

      484KB

    • MD5

      fa8b6bb4cb6d79361cf262af2a49d107

    • SHA1

      149dc01745056d2879a042f6439c67926a7578e4

    • SHA256

      47c3ef34e5af85b3c37bb213c9e1916ed4d510f372886b88cc8e06dd612eac7c

    • SHA512

      cc69c684099fa18d9014927aac661136e0c4f303c61f0c6cb77aa1dbb6cf40973f3034f19f492193d48f047eb14931b5a482dc24c65d68bf4e628544e0e9a40e

    • SSDEEP

      12288:aths4juzSfHys+1f1dVCtPsqc8v5qMd96YJcEpX2bP:gs4juzSfv+qtLc8v5DH6sX2bP

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks