General

  • Target

    169c60b6443a0869888bd8531bd16860_JaffaCakes118

  • Size

    91KB

  • Sample

    241005-hn2kpavhna

  • MD5

    169c60b6443a0869888bd8531bd16860

  • SHA1

    66f17dfe56695a72df59218908d31b94e07f9610

  • SHA256

    bca7b6aee28bdb9e76e868af12c1f59bef0aad5d53e2052fd5ea516b70a221fd

  • SHA512

    70721de477ed8e4aae17d05f1f01dd2e4cac2aa28323ef68dfa4005119f29fa546f98466b5953b4d1014af1074f0bf75342931e69112c66d6372b6187ccf0ce2

  • SSDEEP

    1536:YORS6106666666666666666666666666GkB:pT1Y+

Malware Config

Targets

    • Target

      169c60b6443a0869888bd8531bd16860_JaffaCakes118

    • Size

      91KB

    • MD5

      169c60b6443a0869888bd8531bd16860

    • SHA1

      66f17dfe56695a72df59218908d31b94e07f9610

    • SHA256

      bca7b6aee28bdb9e76e868af12c1f59bef0aad5d53e2052fd5ea516b70a221fd

    • SHA512

      70721de477ed8e4aae17d05f1f01dd2e4cac2aa28323ef68dfa4005119f29fa546f98466b5953b4d1014af1074f0bf75342931e69112c66d6372b6187ccf0ce2

    • SSDEEP

      1536:YORS6106666666666666666666666666GkB:pT1Y+

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (2199) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks