General

  • Target

    e7067b8d2ee2e8424252309c52ae5267_JaffaCakes118

  • Size

    900KB

  • Sample

    240917-rvgcrsyarn

  • MD5

    e7067b8d2ee2e8424252309c52ae5267

  • SHA1

    26f0763a153fcfa7b3507d8dffa66aca50de01b8

  • SHA256

    6460090f2c1336191bba12b431bc66cc849714ea8bcfad0bc0eba84cc1d503aa

  • SHA512

    474e5c19cada8794a510b53aa1ee74a3d6ffa6bdea7eb403b0a9524ce7c091d42ecc494a3a590732302339004f3663f6753bfb3efd72f2ba98af67c0deca8c29

  • SSDEEP

    12288:pqUoJNlaWfkQHNNnXXk+aiptW5v9edN1gFAbdYhLtDSu6vje/bPFL5yWOwE4huL:pqUoXDt5E+qI+hLh9tLUN4hu

Malware Config

Targets

    • Target

      e7067b8d2ee2e8424252309c52ae5267_JaffaCakes118

    • Size

      900KB

    • MD5

      e7067b8d2ee2e8424252309c52ae5267

    • SHA1

      26f0763a153fcfa7b3507d8dffa66aca50de01b8

    • SHA256

      6460090f2c1336191bba12b431bc66cc849714ea8bcfad0bc0eba84cc1d503aa

    • SHA512

      474e5c19cada8794a510b53aa1ee74a3d6ffa6bdea7eb403b0a9524ce7c091d42ecc494a3a590732302339004f3663f6753bfb3efd72f2ba98af67c0deca8c29

    • SSDEEP

      12288:pqUoJNlaWfkQHNNnXXk+aiptW5v9edN1gFAbdYhLtDSu6vje/bPFL5yWOwE4huL:pqUoXDt5E+qI+hLh9tLUN4hu

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks