General

  • Target

    257196c587f88956733aef5b754fa2fc_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240704-lemlystgpj

  • MD5

    257196c587f88956733aef5b754fa2fc

  • SHA1

    6beb3f81fa874f2259c52f9cdd895b9438c7986f

  • SHA256

    2c85ef7ad9d98e67c576376aa3b4f4d6f5dde48df4a5c2b907c084c0ed5e9e0e

  • SHA512

    5bf524100ba8ecf1ea2bb426691df851c82254a929f520926e939ac0605856c312d9e4432ffee6f385432bd1541ea47658c7f408fe59c67131943d1943d8b7be

  • SSDEEP

    49152:KpUc/5vGFEvgpbUUMgY6stBnM5pK7HQkq7:e/5LlAICFkq7

Malware Config

Targets

    • Target

      257196c587f88956733aef5b754fa2fc_JaffaCakes118

    • Size

      1.6MB

    • MD5

      257196c587f88956733aef5b754fa2fc

    • SHA1

      6beb3f81fa874f2259c52f9cdd895b9438c7986f

    • SHA256

      2c85ef7ad9d98e67c576376aa3b4f4d6f5dde48df4a5c2b907c084c0ed5e9e0e

    • SHA512

      5bf524100ba8ecf1ea2bb426691df851c82254a929f520926e939ac0605856c312d9e4432ffee6f385432bd1541ea47658c7f408fe59c67131943d1943d8b7be

    • SSDEEP

      49152:KpUc/5vGFEvgpbUUMgY6stBnM5pK7HQkq7:e/5LlAICFkq7

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks