General

  • Target

    JaffaCakes118_1535e874cee7e1df1d74b9fc7dc3e384

  • Size

    271KB

  • Sample

    250221-ztk9bs1jbl

  • MD5

    1535e874cee7e1df1d74b9fc7dc3e384

  • SHA1

    71738c727ef7cb649ce2c2c8298d8f3fca374449

  • SHA256

    b10582f5f24f6eba780b8080b68bd364f303d970d29c42c043d246deb111636d

  • SHA512

    1f8310f5d4194054f2cee4921311d790e1d9fffa7e9ec7a59cc2a78ad6d3d02787e84a39323033d30483d14c313f69c4d3d02168ca35383f350f8e25ac87f04e

  • SSDEEP

    6144:klG6mwqAu92px6h7B5xpiKlBX7i3zW1R63j8McR6f+lp:klMj92pm1d37uC1uqcf+lp

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    limposhare

Targets

    • Target

      JaffaCakes118_1535e874cee7e1df1d74b9fc7dc3e384

    • Size

      271KB

    • MD5

      1535e874cee7e1df1d74b9fc7dc3e384

    • SHA1

      71738c727ef7cb649ce2c2c8298d8f3fca374449

    • SHA256

      b10582f5f24f6eba780b8080b68bd364f303d970d29c42c043d246deb111636d

    • SHA512

      1f8310f5d4194054f2cee4921311d790e1d9fffa7e9ec7a59cc2a78ad6d3d02787e84a39323033d30483d14c313f69c4d3d02168ca35383f350f8e25ac87f04e

    • SSDEEP

      6144:klG6mwqAu92px6h7B5xpiKlBX7i3zW1R63j8McR6f+lp:klMj92pm1d37uC1uqcf+lp

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks