General

  • Target

    JaffaCakes118_be703c6463c6abecf9b40ceb8767f965

  • Size

    753KB

  • Sample

    250418-rprljsvyhw

  • MD5

    be703c6463c6abecf9b40ceb8767f965

  • SHA1

    ff01b76ce1d089d9463fc49f0a504e79bad2887a

  • SHA256

    915ef27293e400c67ee19313700ddd96e0bd1b9becabd68d50b461d91cfe2941

  • SHA512

    9523ae8aedc59e561c13548b35ffceb23b7892cba4894daa6c17d660d58f36fc5a69e39c2e92c3713eb44e561c056e8cd6384952882b0d0fb861946177b750be

  • SSDEEP

    12288:/uD68wSJOCJqQfHH6V23nJc2qq24Qy5Z9mm744L9Nd/FB77lwecB3zWuoPXGbdZT:QJOCJfHagJc51q9mmM4L9NdFB/lw1xxZ

Malware Config

Targets

    • Target

      JaffaCakes118_be703c6463c6abecf9b40ceb8767f965

    • Size

      753KB

    • MD5

      be703c6463c6abecf9b40ceb8767f965

    • SHA1

      ff01b76ce1d089d9463fc49f0a504e79bad2887a

    • SHA256

      915ef27293e400c67ee19313700ddd96e0bd1b9becabd68d50b461d91cfe2941

    • SHA512

      9523ae8aedc59e561c13548b35ffceb23b7892cba4894daa6c17d660d58f36fc5a69e39c2e92c3713eb44e561c056e8cd6384952882b0d0fb861946177b750be

    • SSDEEP

      12288:/uD68wSJOCJqQfHH6V23nJc2qq24Qy5Z9mm744L9Nd/FB77lwecB3zWuoPXGbdZT:QJOCJfHagJc51q9mmM4L9NdFB/lw1xxZ

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Contacts a large (568) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks