General

  • Target

    23f7e9bb64b166b543ad6ca59169e924_JaffaCakes118

  • Size

    7KB

  • Sample

    241008-xrx41avhrr

  • MD5

    23f7e9bb64b166b543ad6ca59169e924

  • SHA1

    1762468e70a29c3d84606cf187b9a7f2bb647faf

  • SHA256

    9761e741458d5c6ddea4f66e2f58a3cb64bf5ac7d71a8d3eaf2606eaa9bf3b7b

  • SHA512

    c4c044eeab01c476d798d89204b4b6505df944916a67eea98e372d293be47a18f0437eb2698d96896693bc70c9f965a3ce79f7babaa4590090775bf89ba5098b

  • SSDEEP

    96:ljZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExmzaePj7jRmW+7nGMUA:Vzdrr1FG1WDCgmjPZmzjPXMJGMUA

Malware Config

Targets

    • Target

      23f7e9bb64b166b543ad6ca59169e924_JaffaCakes118

    • Size

      7KB

    • MD5

      23f7e9bb64b166b543ad6ca59169e924

    • SHA1

      1762468e70a29c3d84606cf187b9a7f2bb647faf

    • SHA256

      9761e741458d5c6ddea4f66e2f58a3cb64bf5ac7d71a8d3eaf2606eaa9bf3b7b

    • SHA512

      c4c044eeab01c476d798d89204b4b6505df944916a67eea98e372d293be47a18f0437eb2698d96896693bc70c9f965a3ce79f7babaa4590090775bf89ba5098b

    • SSDEEP

      96:ljZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExmzaePj7jRmW+7nGMUA:Vzdrr1FG1WDCgmjPZmzjPXMJGMUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (2214) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks