General
-
Target
94de2cedfe695207af61088717072278_JaffaCakes118
-
Size
899KB
-
Sample
240813-1n6thssejm
-
MD5
94de2cedfe695207af61088717072278
-
SHA1
0f9b8e42a8f45e9ad5f39c61a5d9003e86752952
-
SHA256
1c30756c44979b327355331e9d9a7f422fe02069ea986919beab5e9080c08b2d
-
SHA512
6d1ff630536a10e8fec811f85f3b108f5c2ef071e4bd03fd79dd5017882e0a0ac8645ae6558946b3681d2b2e9b52e4a611b410db4d3103e082e8c8dbe475c5b4
-
SSDEEP
24576:3ZiM8O3U7QqA+oQqS8blWo1YGirtZ7Ekwyzs:3ZiM8OvqAEd8blB1YGyEyQ
Static task
static1
Behavioral task
behavioral1
Sample
94de2cedfe695207af61088717072278_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94de2cedfe695207af61088717072278_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.angelfire.com - Port:
21 - Username:
vedadsara - Password:
rijadz
Targets
-
-
Target
94de2cedfe695207af61088717072278_JaffaCakes118
-
Size
899KB
-
MD5
94de2cedfe695207af61088717072278
-
SHA1
0f9b8e42a8f45e9ad5f39c61a5d9003e86752952
-
SHA256
1c30756c44979b327355331e9d9a7f422fe02069ea986919beab5e9080c08b2d
-
SHA512
6d1ff630536a10e8fec811f85f3b108f5c2ef071e4bd03fd79dd5017882e0a0ac8645ae6558946b3681d2b2e9b52e4a611b410db4d3103e082e8c8dbe475c5b4
-
SSDEEP
24576:3ZiM8O3U7QqA+oQqS8blWo1YGirtZ7Ekwyzs:3ZiM8OvqAEd8blB1YGyEyQ
Score10/10-
Ardamax main executable
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-