General

  • Target

    1f2455b3fabf0d58054a0465907214bc_JaffaCakes118

  • Size

    992KB

  • Sample

    241008-c52zwsygkc

  • MD5

    1f2455b3fabf0d58054a0465907214bc

  • SHA1

    3b1cfe7b5a0aa99a6fd2ce013c696c6ad10da64e

  • SHA256

    6a8718b7edebd4a4d8782bf8e73ef4bcc98c65ad6f2de93e49777267021c3d7c

  • SHA512

    bd2fc5f36f761179c99ab0dbf3573fc7857557de7ec222f7714dbf87d2c5b67c660adf9dbc8318fded83f419a0ee67087143c58b87c8096fb94666e0725a815c

  • SSDEEP

    24576:VDLo/S7kh4Vk2vr4velre8/AKqZGCImWB:VwS7ADKrUSrJ/AKL

Malware Config

Targets

    • Target

      1f2455b3fabf0d58054a0465907214bc_JaffaCakes118

    • Size

      992KB

    • MD5

      1f2455b3fabf0d58054a0465907214bc

    • SHA1

      3b1cfe7b5a0aa99a6fd2ce013c696c6ad10da64e

    • SHA256

      6a8718b7edebd4a4d8782bf8e73ef4bcc98c65ad6f2de93e49777267021c3d7c

    • SHA512

      bd2fc5f36f761179c99ab0dbf3573fc7857557de7ec222f7714dbf87d2c5b67c660adf9dbc8318fded83f419a0ee67087143c58b87c8096fb94666e0725a815c

    • SSDEEP

      24576:VDLo/S7kh4Vk2vr4velre8/AKqZGCImWB:VwS7ADKrUSrJ/AKL

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks