Resubmissions

30-07-2023 23:06

230730-23w4asbf54 10

30-07-2023 20:04

230730-ytlz7abc77 10

30-07-2023 20:00

230730-yqxyaabc67 10

General

  • Target

    database.iso

  • Size

    69.7MB

  • Sample

    230730-ytlz7abc77

  • MD5

    ea91bffa35a90c625af0fa48b10b7efe

  • SHA1

    d6d3818f44d82c1e3e2933aa13e87c592d4e7670

  • SHA256

    35f81c70e570891c59d7fdcef17d22d6f6df913a0e30dcb1dd6fc42a38b48475

  • SHA512

    a9c53f487f3552fe7749ba0a9c79cf6a8b3c06794f7862b696c6e04f164cb0630791ed772120267e5c9c0276cc0efc4b269fa4629575df544bcd4f745954a74c

  • SSDEEP

    1572864:UvrzuXaQLrouRp2OztQNmsoF5bfq1oDRl6toF88B99ea7/KOAhi:QrzELrDhQ0soF5bm6d8A5n

Malware Config

Targets

    • Target

      database.iso

    • Size

      69.7MB

    • MD5

      ea91bffa35a90c625af0fa48b10b7efe

    • SHA1

      d6d3818f44d82c1e3e2933aa13e87c592d4e7670

    • SHA256

      35f81c70e570891c59d7fdcef17d22d6f6df913a0e30dcb1dd6fc42a38b48475

    • SHA512

      a9c53f487f3552fe7749ba0a9c79cf6a8b3c06794f7862b696c6e04f164cb0630791ed772120267e5c9c0276cc0efc4b269fa4629575df544bcd4f745954a74c

    • SSDEEP

      1572864:UvrzuXaQLrouRp2OztQNmsoF5bfq1oDRl6toF88B99ea7/KOAhi:QrzELrDhQ0soF5bm6d8A5n

    • Detected Xorist Ransomware

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks