General

  • Target

    852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118

  • Size

    6.3MB

  • Sample

    241102-nff7nsvram

  • MD5

    852d4f447f4aac4f61063ef5849e68b8

  • SHA1

    8529bba312dd85254ac2240e1f57d98c0fed1766

  • SHA256

    9ef8406742a277c694c6e454c16c95528377f0ba8cb56f37a7dfdd53d803c6ec

  • SHA512

    19586186fa50405d2b972bd25344833db52076451e68dac985156e8bc96beea6469e9f1fae1cc7afd3f8eeef3b4d24d2b844af93888df56b927b7a266e794c59

  • SSDEEP

    98304:qOKFSYln3X0qnvbXEsBc4i3dxgkVRdgjh5Fn4zj0IBTGFJZkdk3AgWcxHE9hDgPf:ynBDEsBqtxgkVRdETnooFOk3bW2k9E

Malware Config

Targets

    • Target

      852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118

    • Size

      6.3MB

    • MD5

      852d4f447f4aac4f61063ef5849e68b8

    • SHA1

      8529bba312dd85254ac2240e1f57d98c0fed1766

    • SHA256

      9ef8406742a277c694c6e454c16c95528377f0ba8cb56f37a7dfdd53d803c6ec

    • SHA512

      19586186fa50405d2b972bd25344833db52076451e68dac985156e8bc96beea6469e9f1fae1cc7afd3f8eeef3b4d24d2b844af93888df56b927b7a266e794c59

    • SSDEEP

      98304:qOKFSYln3X0qnvbXEsBc4i3dxgkVRdgjh5Fn4zj0IBTGFJZkdk3AgWcxHE9hDgPf:ynBDEsBqtxgkVRdETnooFOk3bW2k9E

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks