General

  • Target

    89a0ee6a35e3270d58b939c1698d8501_JaffaCakes118

  • Size

    607KB

  • Sample

    240811-j2d7zs1grr

  • MD5

    89a0ee6a35e3270d58b939c1698d8501

  • SHA1

    3b6ccec7f6b695202a38bafce1f941e6972e72ca

  • SHA256

    b9c778a970638b7adc37e6c8f45db813f5b2706c2fd460b931bbb7d17db15676

  • SHA512

    2943bf81a44b4aa9df933591aab97e7b84af9cdbd0fe3e534027ec2ceae5ae4162818737e87bdb3e184c6c7ac5355be431b1648920bf3998debd00d586f67a41

  • SSDEEP

    12288:iFd74XSnU+9zOlhlRoyiJltC6ogGN5DexSyBtAncRYOQ/AtZG89rkW/ozX:qtU+9zOBqyiJlthotLexSy/AnclG0rRU

Malware Config

Targets

    • Target

      89a0ee6a35e3270d58b939c1698d8501_JaffaCakes118

    • Size

      607KB

    • MD5

      89a0ee6a35e3270d58b939c1698d8501

    • SHA1

      3b6ccec7f6b695202a38bafce1f941e6972e72ca

    • SHA256

      b9c778a970638b7adc37e6c8f45db813f5b2706c2fd460b931bbb7d17db15676

    • SHA512

      2943bf81a44b4aa9df933591aab97e7b84af9cdbd0fe3e534027ec2ceae5ae4162818737e87bdb3e184c6c7ac5355be431b1648920bf3998debd00d586f67a41

    • SSDEEP

      12288:iFd74XSnU+9zOlhlRoyiJltC6ogGN5DexSyBtAncRYOQ/AtZG89rkW/ozX:qtU+9zOBqyiJlthotLexSy/AnclG0rRU

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks