General

  • Target

    1e793474bff4e7b93b8fd009278845c3_JaffaCakes118

  • Size

    7KB

  • Sample

    241007-3pbe4ssdqg

  • MD5

    1e793474bff4e7b93b8fd009278845c3

  • SHA1

    71a32857228842dc9edbc28b254fe1fd78666a04

  • SHA256

    db361bca86d4798443ecc226f9c6366ea0bbf50125fb0b80d3d5463ba5ab75a8

  • SHA512

    e6018182d01365eb4114a0e791cfc9d80f5b0d1343354589448f997db1db2c51c455215a31b88f1f9a8aafc5bc290441632e33732de5e80bb86dfa5c9e527131

  • SSDEEP

    96:l/iZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExzsXirSA5JZgcIv9C7n:lizdrr1FG1WDCgmjPZYypbgV96+MUA

Malware Config

Targets

    • Target

      1e793474bff4e7b93b8fd009278845c3_JaffaCakes118

    • Size

      7KB

    • MD5

      1e793474bff4e7b93b8fd009278845c3

    • SHA1

      71a32857228842dc9edbc28b254fe1fd78666a04

    • SHA256

      db361bca86d4798443ecc226f9c6366ea0bbf50125fb0b80d3d5463ba5ab75a8

    • SHA512

      e6018182d01365eb4114a0e791cfc9d80f5b0d1343354589448f997db1db2c51c455215a31b88f1f9a8aafc5bc290441632e33732de5e80bb86dfa5c9e527131

    • SSDEEP

      96:l/iZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExzsXirSA5JZgcIv9C7n:lizdrr1FG1WDCgmjPZYypbgV96+MUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (2197) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks