General

  • Target

    d7a3e49a7c35c45184756780b5afc463_JaffaCakes118

  • Size

    951KB

  • Sample

    241208-sdjx1awrfy

  • MD5

    d7a3e49a7c35c45184756780b5afc463

  • SHA1

    3dfaad93979bb47fb78c12cda73575510e6f62b3

  • SHA256

    e58cf6ad9cec6fff03e64f82e18364fa5e5dc5de8972c35fb6761eab4eca1e2e

  • SHA512

    61d875d498c39b572626a5253cf39aeebc4c3268c6ea9cf3e69fad47dce718833d2cd943885690e50f78897bc5acd1f5329c2a473f4364c2c6d0673da445d2e0

  • SSDEEP

    12288:RG5W3NwL57YMY//MNGxk4y0XOy2dKPJniUUYI9RFa3cMGVhVN9OfXQ2Yvg4NlDVP:RG5VLFySGG47+e49qzswgx28lhPrgE

Malware Config

Targets

    • Target

      d7a3e49a7c35c45184756780b5afc463_JaffaCakes118

    • Size

      951KB

    • MD5

      d7a3e49a7c35c45184756780b5afc463

    • SHA1

      3dfaad93979bb47fb78c12cda73575510e6f62b3

    • SHA256

      e58cf6ad9cec6fff03e64f82e18364fa5e5dc5de8972c35fb6761eab4eca1e2e

    • SHA512

      61d875d498c39b572626a5253cf39aeebc4c3268c6ea9cf3e69fad47dce718833d2cd943885690e50f78897bc5acd1f5329c2a473f4364c2c6d0673da445d2e0

    • SSDEEP

      12288:RG5W3NwL57YMY//MNGxk4y0XOy2dKPJniUUYI9RFa3cMGVhVN9OfXQ2Yvg4NlDVP:RG5VLFySGG47+e49qzswgx28lhPrgE

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks