General

  • Target

    ec2b6ecfc8ca67f9357b6550166a0838

  • Size

    506KB

  • Sample

    231222-tpxtnsegeq

  • MD5

    ec2b6ecfc8ca67f9357b6550166a0838

  • SHA1

    134a0ae85224a12e3b8114900b83c9669524d427

  • SHA256

    8b1c6d1c4df109ef648f36a31e59e492c9752b0acf0eea26a0a75b2398c5d86c

  • SHA512

    d4803c161590c31dadebc13b1d505ee1cf1fbaee52facacdc5ea38bb16f485377819877b4a7662b255caf95c2f5ac93149f211e35c940660d0398142a00bc424

  • SSDEEP

    12288:A1V8jxipOdK/nJr+ihc9DRVnXGrqgv6rk551VkG1ZUQ/bQDiW:q8lipOAgoc9L2PM5ybKi

Malware Config

Targets

    • Target

      ec2b6ecfc8ca67f9357b6550166a0838

    • Size

      506KB

    • MD5

      ec2b6ecfc8ca67f9357b6550166a0838

    • SHA1

      134a0ae85224a12e3b8114900b83c9669524d427

    • SHA256

      8b1c6d1c4df109ef648f36a31e59e492c9752b0acf0eea26a0a75b2398c5d86c

    • SHA512

      d4803c161590c31dadebc13b1d505ee1cf1fbaee52facacdc5ea38bb16f485377819877b4a7662b255caf95c2f5ac93149f211e35c940660d0398142a00bc424

    • SSDEEP

      12288:A1V8jxipOdK/nJr+ihc9DRVnXGrqgv6rk551VkG1ZUQ/bQDiW:q8lipOAgoc9L2PM5ybKi

    • Detected Xorist Ransomware

    • Modifies firewall policy service

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (1913) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks