General

  • Target

    JaffaCakes118_f9a4e6c353dd321a77c04f0102c0601f

  • Size

    671KB

  • Sample

    250214-tma7wstmgy

  • MD5

    f9a4e6c353dd321a77c04f0102c0601f

  • SHA1

    88179f6d798960d9f02a81065ff85a9478be6385

  • SHA256

    fc80a12759fa305b39380e2f0293cd080fe7a9deef2f23d5d102ad7f64a43fe9

  • SHA512

    9c1e8507fcf51d9c8393cd192bdb569ff935b5830d70993c8978ea1abc168908cb0742d50bb06c39863cc222f8e2b852139cf6dd79299216aedd7dfdfeed62fb

  • SSDEEP

    12288:qUP86kpqTP7miyCMn9aWSE+YniyhOFWTzHvv5A4czoiJrE12/8:dP86kUHmiy5ndiy2WTDpFMoEE12k

Malware Config

Targets

    • Target

      JaffaCakes118_f9a4e6c353dd321a77c04f0102c0601f

    • Size

      671KB

    • MD5

      f9a4e6c353dd321a77c04f0102c0601f

    • SHA1

      88179f6d798960d9f02a81065ff85a9478be6385

    • SHA256

      fc80a12759fa305b39380e2f0293cd080fe7a9deef2f23d5d102ad7f64a43fe9

    • SHA512

      9c1e8507fcf51d9c8393cd192bdb569ff935b5830d70993c8978ea1abc168908cb0742d50bb06c39863cc222f8e2b852139cf6dd79299216aedd7dfdfeed62fb

    • SSDEEP

      12288:qUP86kpqTP7miyCMn9aWSE+YniyhOFWTzHvv5A4czoiJrE12/8:dP86kUHmiy5ndiy2WTDpFMoEE12k

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks