MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2e45cb35a6a9aaa1c827fb3bfcc102650bf3fa8df381e5d52cb8cd908119d91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ardamax


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e2e45cb35a6a9aaa1c827fb3bfcc102650bf3fa8df381e5d52cb8cd908119d91
SHA3-384 hash: 02444ae17d847344eaeb6f0d2518a4841951e6436759d136699af3644aed66df2122bb5ae7c9e999ff9cea103fd20e2a
SHA1 hash: 27de1fddf5c9b9ace59c5a2791eaac3219fd0cc3
MD5 hash: 89da7df2747d184978be6103c71f26ef
humanhash: utah-blossom-tennis-tango
File name:Payment confirmation.exe
Download: download sample
Signature Ardamax
File size:4'222'976 bytes
First seen:2020-06-26 06:04:58 UTC
Last seen:2020-06-26 06:41:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash df486f43bf973c0eadfec1c12277084c (2 x Ardamax)
ssdeep 98304:0lb+cqi+wtT11HT3GYwgeKqoTTxm4HqxDgKP2zzC1VIqUB7ouHT:0EB3wRLGbSzxmE2s1zuIz
Threatray 8 similar samples on MalwareBazaar
TLSH 0916016AEF0218B2E8001A3784B7571593D9D8CD1973E787411EEE58BEEF9CC9D2291C
Reporter oppimaniac
Tags:Ardamax

Intelligence


File Origin
# of uploads :
2
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Setting a global event handler
Launching a process
Moving a recently created file
Sending a custom TCP request
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Threat name:
Win64.Keylogger.Ardamax
Status:
Malicious
First seen:
2020-06-26 06:06:07 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Adds Run entry to start application
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments