General

  • Target

    d98480dc3233a41f218dcd7434c6155c_JaffaCakes118

  • Size

    765KB

  • Sample

    240911-drmhqa1arf

  • MD5

    d98480dc3233a41f218dcd7434c6155c

  • SHA1

    f72d82af93e9f1034d7b44b15455fed3444ec922

  • SHA256

    e8d04e07e8d1b850160e3c0941d7f2771ef5260e6997d3436141583ef6df95dc

  • SHA512

    f8c9b1310b0b5683e37e8ce29a7894d099b1d25cc817f64440c36c4702287b022add8ebeeff3f1d479aa7837e63c2536f44edd12e4b98017a7430433a38586bd

  • SSDEEP

    12288:B2GAhXZhcEj07z8EgtAHfpZv4akDlq1Zz3fg3URM8iuf0mC+6bwNIBt0/q:yLJwMAfpZQTlmpIERM8iuf09rtoq

Malware Config

Targets

    • Target

      d98480dc3233a41f218dcd7434c6155c_JaffaCakes118

    • Size

      765KB

    • MD5

      d98480dc3233a41f218dcd7434c6155c

    • SHA1

      f72d82af93e9f1034d7b44b15455fed3444ec922

    • SHA256

      e8d04e07e8d1b850160e3c0941d7f2771ef5260e6997d3436141583ef6df95dc

    • SHA512

      f8c9b1310b0b5683e37e8ce29a7894d099b1d25cc817f64440c36c4702287b022add8ebeeff3f1d479aa7837e63c2536f44edd12e4b98017a7430433a38586bd

    • SSDEEP

      12288:B2GAhXZhcEj07z8EgtAHfpZv4akDlq1Zz3fg3URM8iuf0mC+6bwNIBt0/q:yLJwMAfpZQTlmpIERM8iuf09rtoq

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks