General

  • Target

    fedb0d11871fcf808c83357a2ab983de_JaffaCakes118

  • Size

    630KB

  • Sample

    240929-tbnzlszgmm

  • MD5

    fedb0d11871fcf808c83357a2ab983de

  • SHA1

    15079b89858512b004f9c750dd53a9901997e137

  • SHA256

    ab9812f1943e549bfb06afd112b82e15e34a3a9721dd7443fc7380b61bf0092f

  • SHA512

    422d915d50834ee30f8078d3143f0746fa124d9fe52e5a01a7c19afd65fa49408644a5bd54117b42a274666ad751eab97f62f0a685a2cff16b59d9fe1e333927

  • SSDEEP

    12288:y3TdtLW5WIj1YSSdFx+vBSXyMzBUWb9lx/9AgHLo8OW+rBYat:MDsj1dEOBcJ9nPx/igrp+Vt

Malware Config

Targets

    • Target

      fedb0d11871fcf808c83357a2ab983de_JaffaCakes118

    • Size

      630KB

    • MD5

      fedb0d11871fcf808c83357a2ab983de

    • SHA1

      15079b89858512b004f9c750dd53a9901997e137

    • SHA256

      ab9812f1943e549bfb06afd112b82e15e34a3a9721dd7443fc7380b61bf0092f

    • SHA512

      422d915d50834ee30f8078d3143f0746fa124d9fe52e5a01a7c19afd65fa49408644a5bd54117b42a274666ad751eab97f62f0a685a2cff16b59d9fe1e333927

    • SSDEEP

      12288:y3TdtLW5WIj1YSSdFx+vBSXyMzBUWb9lx/9AgHLo8OW+rBYat:MDsj1dEOBcJ9nPx/igrp+Vt

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks