General

  • Target

    3a5ed23192238ac0491adf5cb46b183a_JaffaCakes118

  • Size

    7KB

  • Sample

    241012-q63vgayapp

  • MD5

    3a5ed23192238ac0491adf5cb46b183a

  • SHA1

    3177eb62741316541415ba3d79e51aadc513bfb6

  • SHA256

    671e240c5e237783d98cfd031782bd2acc38f79ad09b32e4fedcb9911ec34635

  • SHA512

    0caa962bd37be330751f0559f146321cb6bd3861cb1c7d668c41189d290b5a5ef10ca670cb3d60d501eb375fca2b8d73dd625d14fd10bad50ec0c94aa7c4e3ab

  • SSDEEP

    96:lHEZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExPD18dNop97p9P/jMU:xEzdrr1FG1WDCgmjPZPeKZXjMUA

Malware Config

Targets

    • Target

      3a5ed23192238ac0491adf5cb46b183a_JaffaCakes118

    • Size

      7KB

    • MD5

      3a5ed23192238ac0491adf5cb46b183a

    • SHA1

      3177eb62741316541415ba3d79e51aadc513bfb6

    • SHA256

      671e240c5e237783d98cfd031782bd2acc38f79ad09b32e4fedcb9911ec34635

    • SHA512

      0caa962bd37be330751f0559f146321cb6bd3861cb1c7d668c41189d290b5a5ef10ca670cb3d60d501eb375fca2b8d73dd625d14fd10bad50ec0c94aa7c4e3ab

    • SSDEEP

      96:lHEZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExPD18dNop97p9P/jMU:xEzdrr1FG1WDCgmjPZPeKZXjMUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (2219) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks