General
-
Target
55fab8d5095780e3164196fdbe273ab3_JaffaCakes118
-
Size
1.2MB
-
Sample
241018-hd2gyaseqg
-
MD5
55fab8d5095780e3164196fdbe273ab3
-
SHA1
4f7bbd00ba02f74f11edf9fe69c743f79344f988
-
SHA256
cc0a3343554853f0ca889e0a299a3d05c4dbe8652d949ad6207bcd1eea3fdc61
-
SHA512
4484a261a7eb4c709abc2429172aaaf7e7d3015bbd4c7b2c584f3b2a07d781ab529670b03a2870239b6cef98b5ca64970e4c9e7b40a18ec66835bebbbafeaa5c
-
SSDEEP
24576:bzjD9iLvEpdbZ+FbaMH/xTJdbMkLTYi4hlRUnuOk819TL4ndGW1I:bzPtjZwl/WkLc1Udd
Static task
static1
Behavioral task
behavioral1
Sample
55fab8d5095780e3164196fdbe273ab3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55fab8d5095780e3164196fdbe273ab3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
facebooliker
Targets
-
-
Target
55fab8d5095780e3164196fdbe273ab3_JaffaCakes118
-
Size
1.2MB
-
MD5
55fab8d5095780e3164196fdbe273ab3
-
SHA1
4f7bbd00ba02f74f11edf9fe69c743f79344f988
-
SHA256
cc0a3343554853f0ca889e0a299a3d05c4dbe8652d949ad6207bcd1eea3fdc61
-
SHA512
4484a261a7eb4c709abc2429172aaaf7e7d3015bbd4c7b2c584f3b2a07d781ab529670b03a2870239b6cef98b5ca64970e4c9e7b40a18ec66835bebbbafeaa5c
-
SSDEEP
24576:bzjD9iLvEpdbZ+FbaMH/xTJdbMkLTYi4hlRUnuOk819TL4ndGW1I:bzPtjZwl/WkLc1Udd
Score10/10-
Ardamax main executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-