General

  • Target

    JaffaCakes118_1a2a92e2e9fff252bf49f78874ce3039

  • Size

    486KB

  • Sample

    250123-xklgmayrhz

  • MD5

    1a2a92e2e9fff252bf49f78874ce3039

  • SHA1

    2a033a47376cf677eaacc45ac764dde69e4f5285

  • SHA256

    e50be530edccfe3ef5839bbcda45fea371ed908354577c01c211716ee6957e09

  • SHA512

    7870df5cac0a2447c22eefc2e16619863cefa2aa9bb22d0e4788c0ffe9c76267e9abf70d0d46a6eff6551c3ca3560444aebe2e3a60f13936ee6db816854e7ec9

  • SSDEEP

    12288:lk2dpPMgDtaEOiLTEtFpn0c4lx5YYzA0RL+voS:3HPM2tWATEKvl7cwL

Malware Config

Targets

    • Target

      JaffaCakes118_1a2a92e2e9fff252bf49f78874ce3039

    • Size

      486KB

    • MD5

      1a2a92e2e9fff252bf49f78874ce3039

    • SHA1

      2a033a47376cf677eaacc45ac764dde69e4f5285

    • SHA256

      e50be530edccfe3ef5839bbcda45fea371ed908354577c01c211716ee6957e09

    • SHA512

      7870df5cac0a2447c22eefc2e16619863cefa2aa9bb22d0e4788c0ffe9c76267e9abf70d0d46a6eff6551c3ca3560444aebe2e3a60f13936ee6db816854e7ec9

    • SSDEEP

      12288:lk2dpPMgDtaEOiLTEtFpn0c4lx5YYzA0RL+voS:3HPM2tWATEKvl7cwL

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks