General

  • Target

    3ebcc0ec24f4f883df0e18c4e81a8b81_JaffaCakes118

  • Size

    906KB

  • Sample

    241013-j2p99awfjd

  • MD5

    3ebcc0ec24f4f883df0e18c4e81a8b81

  • SHA1

    490bf7e10ac597d603a66179c6e327bc6b183599

  • SHA256

    db6caf0d960158ddea58014c0f62e0ac5c7a5ffc147ff1b71af479324c1aacde

  • SHA512

    6f71207fbbf669519e13d873659a38a0484152ff9bbc1c7b7e17c0adf0e2bb1b53ecfb061b7ce6e1e0ef15ceb5510a6e2295b9625e77af928a1644075ffc6e52

  • SSDEEP

    768:Yn/J8wMaNCE44lD1USubS3/fP9U5KWpuW+MqjojnVc9uV3:Yn/J8cQYpbnPepuBMqSQI3

Malware Config

Targets

    • Target

      3ebcc0ec24f4f883df0e18c4e81a8b81_JaffaCakes118

    • Size

      906KB

    • MD5

      3ebcc0ec24f4f883df0e18c4e81a8b81

    • SHA1

      490bf7e10ac597d603a66179c6e327bc6b183599

    • SHA256

      db6caf0d960158ddea58014c0f62e0ac5c7a5ffc147ff1b71af479324c1aacde

    • SHA512

      6f71207fbbf669519e13d873659a38a0484152ff9bbc1c7b7e17c0adf0e2bb1b53ecfb061b7ce6e1e0ef15ceb5510a6e2295b9625e77af928a1644075ffc6e52

    • SSDEEP

      768:Yn/J8wMaNCE44lD1USubS3/fP9U5KWpuW+MqjojnVc9uV3:Yn/J8cQYpbnPepuBMqSQI3

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (2218) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks