General

  • Target

    dca974dd704022af9c3adfdfb42007b0_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240912-vhbhjavcjm

  • MD5

    dca974dd704022af9c3adfdfb42007b0

  • SHA1

    7b0c9fbcc5ae0fcca3b0a53030819df7c6dfd546

  • SHA256

    c4099ac3f5861b0c6d227c389f5597cffb64dc340a9d79e50eba457745203d8c

  • SHA512

    3a92bd8c403652859177deb60af54f5965ce5d1088a99fc4c72c1c4bcd0857f6a5c3edfbf336be8293442fa5a962670218ce556b0ff03429c1484373b5f21175

  • SSDEEP

    24576:XrHV4SGPDx+SccjcZ3nxQc/aJoSlDZciA0GLlH2DLfbtdhvXijBqBVYq:uSqNkcSQc/aJfl1cbLlWJzvSNqBV/

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    dhiliph

Targets

    • Target

      dca974dd704022af9c3adfdfb42007b0_JaffaCakes118

    • Size

      1.4MB

    • MD5

      dca974dd704022af9c3adfdfb42007b0

    • SHA1

      7b0c9fbcc5ae0fcca3b0a53030819df7c6dfd546

    • SHA256

      c4099ac3f5861b0c6d227c389f5597cffb64dc340a9d79e50eba457745203d8c

    • SHA512

      3a92bd8c403652859177deb60af54f5965ce5d1088a99fc4c72c1c4bcd0857f6a5c3edfbf336be8293442fa5a962670218ce556b0ff03429c1484373b5f21175

    • SSDEEP

      24576:XrHV4SGPDx+SccjcZ3nxQc/aJoSlDZciA0GLlH2DLfbtdhvXijBqBVYq:uSqNkcSQc/aJfl1cbLlWJzvSNqBV/

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks