General

  • Target

    c5dc872493484557cca5115944d5bc23_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240827-2gkhdavdqb

  • MD5

    c5dc872493484557cca5115944d5bc23

  • SHA1

    7e273cca94a8fe28d1ca41bec533274cf99d135f

  • SHA256

    4f39eb15caf1f914da1fd37c3446fe79bdf6b3650dfa08dbe91972227a7d8574

  • SHA512

    8acc51762452c20c8ce0f91054ed039a6b279e8d2c536af129a5f23ab08b97389c974eef7a3a3c96b6f8134ef4b57d18e5181858fb4c821db1f5f5aa880bdf5c

  • SSDEEP

    24576:UHvZThWXS3+wfvh66/dbfoeVL9pjl2+y5p00fWshv6Fw/qoz:cBTgs+wYkbAerpjqr0KyFEL

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    homecomming

Targets

    • Target

      c5dc872493484557cca5115944d5bc23_JaffaCakes118

    • Size

      1.1MB

    • MD5

      c5dc872493484557cca5115944d5bc23

    • SHA1

      7e273cca94a8fe28d1ca41bec533274cf99d135f

    • SHA256

      4f39eb15caf1f914da1fd37c3446fe79bdf6b3650dfa08dbe91972227a7d8574

    • SHA512

      8acc51762452c20c8ce0f91054ed039a6b279e8d2c536af129a5f23ab08b97389c974eef7a3a3c96b6f8134ef4b57d18e5181858fb4c821db1f5f5aa880bdf5c

    • SSDEEP

      24576:UHvZThWXS3+wfvh66/dbfoeVL9pjl2+y5p00fWshv6Fw/qoz:cBTgs+wYkbAerpjqr0KyFEL

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks