Threat Database Keyloggers Keylogger.Ardamax

Keylogger.Ardamax

By CagedTech in Keyloggers

Threat Scorecard

Popularity Rank: 14,634
Threat Level: 80 % (High)
Infected Computers: 10,303
First Seen: July 24, 2009
Last Seen: December 24, 2025
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Fortinet W32/Gbot.YRA!tr.bdr
AntiVir SPR/Tool.Ardamax.556
Kaspersky Backdoor.Win32.Gbot.yra
McAfee Artemis!647F311B4718
AVG Ardamax.BUD
BitDefender MemScan:Trojan.Generic.8306227
Avast Win32:Ardamax-PU [PUP]
McAfee Artemis!3DEBCBACE7A0
AVG Ardamax.BWQ
McAfee Artemis!D7BB86DA5866
Avast Win32:Ardamax-QG [PUP]
AntiVir SPR/Tool.Monitor.Gen
Avast Win32:Ardamax-QI [PUP]
McAfee Artemis!2BE9E4E80820
Panda Generic Trojan

File System Details

Keylogger.Ardamax may create the following file(s):
# File Name MD5 Detections
1. CSJ.exe 29a6ac921bfd693769a7f7e255dc2e77 37
2. DFC.exe b37aad7a36fbbb2d2054e082d590a76c 11
3. AKV.exe b8fa30233794772b8b76b4b1d91c7321 8
4. LYA.exe 3cd29c0df98a7aeb69a9692843ca3edb 7
5. ETK.exe 56dce36cac37d632bf722e9804e4965e 4
6. BCR.exe b910f5d24e399a13f6aae20535ac05b4 4
7. setup_akl64 (password=ardamax).exe e3d267c02ec24bd475e394551cca6ad0 4
8. MAI.exe e40fa583acd317b71575596bd8bc10b8 3
9. MSQ.exe f22340c8c0caad1136de9bec84c82281 3
10. ELU.exe 785197d7f66a482b64c5ae297016d24e 3
11. POL.exe 8459b0ba642d016c60571a3ad31e6ec8 3
12. setup_akl (password=ardamax).exe 725f36560115d2a096df3e499d6ba449 3
13. cssrs.exe f1f1381529361201f120057295f3703d 2
14. TND.exe a6c12264242dba831b32523a07688d4a 2
15. QHI.exe d5918580ed2951ab6b1a5a94719757ff 2
16. FYB.exe 14f067c0291ce6a4a4c4735ba7f4712d 2
17. WDI.exe ed53cef3e425639f180392ccf031f9ce 2
18. NGK.exe 0aaffc12ef1b416b9276bdc3fdec9dff 2
19. HWF.exe 647f311b471810298c1d0b3b43966d8c 2
20. UIB.exe 47d45da7bc718cef809ecec470987248 1
21. YHF.exe ff5d248fc602b8d6fb11a7aa8cf27391 1
22. YEY.exe 53522c8c3b01191caae1e1e2692c42de 1
23. YHH.exe 7f9e58f1df8721ed17066d08a769c73a 1
24. JTF.exe ce6e2998fc31ef25e3771cd7be4f4e75 1
25. VXJQ.exe 346114aaad81ab66017869909fe59a6d 0
26. svchost.exe 9b1569de016fbd9ae313976cf81f6839 0
More files

Registry Details

Keylogger.Ardamax may create the following registry entry or registry entries:
File name without path
setup (password=ardamax).exe
Regexp file mask
%APPDATA%\support\svchost.exe

Directories

Keylogger.Ardamax may create the following directory or directories:

%ALLUSERSPROFILE%\auk
%ALLUSERSPROFILE%\cve
%WINDIR%\Syswow64\sys32
%WINDIR%\system32\sys32

Analysis Report

General information

Family Name: Keylogger.Ardamax
Signature status: No Signature

Known Samples

MD5: fd95ced96288d0c2d22d8044ab7f117d
SHA1: f2669903baeed765a23010f231141cfe4b94749c
SHA256: AB11EED347EDCD561D6EB09AD49849BB2468FB0A67A6E437286029C10DFBCC0E
File Size: 1.63 MB, 1625900 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\callansiplugin.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\callansiplugin.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\dcryptdll.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\dcryptdll.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\system.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\uac.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nst3ed1.tmp\uac.dll Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix Cookie: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix Visited: RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::failed_count RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::state  RegNtPreCreateKey
Show More
HKCU\software\microsoft\edge\thirdparty::statuscodes (NULL) RegNtPreCreateKey
HKCU\software\microsoft\edge\thirdparty::statuscodes  RegNtPreCreateKey
HKCU\software\microsoft\edge\elfbeacon::version 143.0.3650.96 RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::failed_count  RegNtPreCreateKey
HKCU\software\microsoft\edge\blbeacon::state  RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess
  • ShellExecute
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDeleteValueKey
Show More
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtPowerInformation
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetValueKey
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Shell Command Execution

open http://www.ardamax.com/keylogger/
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://www.ardamax.com/keylogger/

Related Posts

Trending

Most Viewed

Loading...