General

  • Target

    55fab8d5095780e3164196fdbe273ab3_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241018-hd2gyaseqg

  • MD5

    55fab8d5095780e3164196fdbe273ab3

  • SHA1

    4f7bbd00ba02f74f11edf9fe69c743f79344f988

  • SHA256

    cc0a3343554853f0ca889e0a299a3d05c4dbe8652d949ad6207bcd1eea3fdc61

  • SHA512

    4484a261a7eb4c709abc2429172aaaf7e7d3015bbd4c7b2c584f3b2a07d781ab529670b03a2870239b6cef98b5ca64970e4c9e7b40a18ec66835bebbbafeaa5c

  • SSDEEP

    24576:bzjD9iLvEpdbZ+FbaMH/xTJdbMkLTYi4hlRUnuOk819TL4ndGW1I:bzPtjZwl/WkLc1Udd

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    facebooliker

Targets

    • Target

      55fab8d5095780e3164196fdbe273ab3_JaffaCakes118

    • Size

      1.2MB

    • MD5

      55fab8d5095780e3164196fdbe273ab3

    • SHA1

      4f7bbd00ba02f74f11edf9fe69c743f79344f988

    • SHA256

      cc0a3343554853f0ca889e0a299a3d05c4dbe8652d949ad6207bcd1eea3fdc61

    • SHA512

      4484a261a7eb4c709abc2429172aaaf7e7d3015bbd4c7b2c584f3b2a07d781ab529670b03a2870239b6cef98b5ca64970e4c9e7b40a18ec66835bebbbafeaa5c

    • SSDEEP

      24576:bzjD9iLvEpdbZ+FbaMH/xTJdbMkLTYi4hlRUnuOk819TL4ndGW1I:bzPtjZwl/WkLc1Udd

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks