General

  • Target

    e083d0b45407aa0e406560cea0b34257_JaffaCakes118

  • Size

    375KB

  • Sample

    241211-jnh9saykdr

  • MD5

    e083d0b45407aa0e406560cea0b34257

  • SHA1

    12f455771fa47b801d0f15b22a706b52207a4c70

  • SHA256

    099f2218b8bfb328833051e0ac0030079fa9dc627c655f9e39f2de0b81df749f

  • SHA512

    2889201dce3930d0698368ab0012d7a4fe5f705a29e1266060a198a990192ae43d391ea1cd9d698f318e44bd333dfec61f9d217e6a16d1fd679a3737cd48e032

  • SSDEEP

    6144:kBRt5X9Eb9dIvU2lF3Ief5XzarDxXDj9uk/0qaGC5fmXvKkTCVpn7UqqeoCmc2N5:kPtpAdIvHB7hXzafxXDjQUO1Nm/KF4aY

Malware Config

Targets

    • Target

      e083d0b45407aa0e406560cea0b34257_JaffaCakes118

    • Size

      375KB

    • MD5

      e083d0b45407aa0e406560cea0b34257

    • SHA1

      12f455771fa47b801d0f15b22a706b52207a4c70

    • SHA256

      099f2218b8bfb328833051e0ac0030079fa9dc627c655f9e39f2de0b81df749f

    • SHA512

      2889201dce3930d0698368ab0012d7a4fe5f705a29e1266060a198a990192ae43d391ea1cd9d698f318e44bd333dfec61f9d217e6a16d1fd679a3737cd48e032

    • SSDEEP

      6144:kBRt5X9Eb9dIvU2lF3Ief5XzarDxXDj9uk/0qaGC5fmXvKkTCVpn7UqqeoCmc2N5:kPtpAdIvHB7hXzafxXDjQUO1Nm/KF4aY

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks