General

  • Target

    JaffaCakes118_e3d93a8909368d5ea775a67e920eede6

  • Size

    503KB

  • Sample

    250211-h24xzaznct

  • MD5

    e3d93a8909368d5ea775a67e920eede6

  • SHA1

    23460bd7e407318eecfe5e2543e267a28839824d

  • SHA256

    e09ac794e7ef4f2e192e89e4e6d5b4a3389691ddbca65cf5292ebf24e4e54fd5

  • SHA512

    3bda9e65c763f1168edbe8a76621b5228a3175d4dda01db32e46801c15c05dca04521f3e70c86e61e575019228a49287a2ec428525b8b59ef09a80e6892a9a3a

  • SSDEEP

    12288:xm4W304NZIS2Yk1hmxhcpjuxonqWiQaCG9RIlJhy3kDE:E+ECSx007aOUaCG94y3kDE

Malware Config

Targets

    • Target

      JaffaCakes118_e3d93a8909368d5ea775a67e920eede6

    • Size

      503KB

    • MD5

      e3d93a8909368d5ea775a67e920eede6

    • SHA1

      23460bd7e407318eecfe5e2543e267a28839824d

    • SHA256

      e09ac794e7ef4f2e192e89e4e6d5b4a3389691ddbca65cf5292ebf24e4e54fd5

    • SHA512

      3bda9e65c763f1168edbe8a76621b5228a3175d4dda01db32e46801c15c05dca04521f3e70c86e61e575019228a49287a2ec428525b8b59ef09a80e6892a9a3a

    • SSDEEP

      12288:xm4W304NZIS2Yk1hmxhcpjuxonqWiQaCG9RIlJhy3kDE:E+ECSx007aOUaCG94y3kDE

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks