General

  • Target

    db85cb238e72f409ce425e6f7084c41e_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240912-a6bszssdjp

  • MD5

    db85cb238e72f409ce425e6f7084c41e

  • SHA1

    2104a6002bc2ab0b71922c6336e979f85a123265

  • SHA256

    554b6a36340629ea467d107f679e87226f42435e26f49f327a2faee2fdf859dd

  • SHA512

    5f967dc5b121decda46ba5d3bb6e39265f4f13ac5b34f96603874783494c5e32bc50e293c05f10948faeb11763cbe2edecf6d0ac7a8283fc58d88995ce869381

  • SSDEEP

    49152:/XTG77pd3I7UCAVw6WPijpyhwq+VWgzuABzbreCYXIT14Eso:CFFIYHGlUAwLlnT

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    googlebr.freehostia.com
  • Port:
    21
  • Username:
    alafon3
  • Password:
    2989679

Targets

    • Target

      db85cb238e72f409ce425e6f7084c41e_JaffaCakes118

    • Size

      2.1MB

    • MD5

      db85cb238e72f409ce425e6f7084c41e

    • SHA1

      2104a6002bc2ab0b71922c6336e979f85a123265

    • SHA256

      554b6a36340629ea467d107f679e87226f42435e26f49f327a2faee2fdf859dd

    • SHA512

      5f967dc5b121decda46ba5d3bb6e39265f4f13ac5b34f96603874783494c5e32bc50e293c05f10948faeb11763cbe2edecf6d0ac7a8283fc58d88995ce869381

    • SSDEEP

      49152:/XTG77pd3I7UCAVw6WPijpyhwq+VWgzuABzbreCYXIT14Eso:CFFIYHGlUAwLlnT

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks