Resubmissions

13-10-2024 18:29

241013-w44lwa1dpd 10

13-10-2024 18:05

241013-wn94qazelh 10

General

  • Target

    414d06a8dca67540149d09179683c4f8_JaffaCakes118

  • Size

    516KB

  • Sample

    241013-w44lwa1dpd

  • MD5

    414d06a8dca67540149d09179683c4f8

  • SHA1

    0782d21a8f45b1e5ba2d981db5b3e5cff23822c4

  • SHA256

    43694a890d49248ef9336363dad7c2eb1ff1acba24a8f25cb4cc4181213a0495

  • SHA512

    d1b9b13ed10e1d26333a75949a0dab298f5df5cda533344e0f91dcb3246bdca687d5ebae25380a620704d94877db2385eb1274c670d3460f72f115859fd867a8

  • SSDEEP

    12288:tfhpwRVXqP5EKso+DVce8vu+HVY1LrStUkPdESN:tkRdqP5E8YVRkVorDeN

Malware Config

Targets

    • Target

      414d06a8dca67540149d09179683c4f8_JaffaCakes118

    • Size

      516KB

    • MD5

      414d06a8dca67540149d09179683c4f8

    • SHA1

      0782d21a8f45b1e5ba2d981db5b3e5cff23822c4

    • SHA256

      43694a890d49248ef9336363dad7c2eb1ff1acba24a8f25cb4cc4181213a0495

    • SHA512

      d1b9b13ed10e1d26333a75949a0dab298f5df5cda533344e0f91dcb3246bdca687d5ebae25380a620704d94877db2385eb1274c670d3460f72f115859fd867a8

    • SSDEEP

      12288:tfhpwRVXqP5EKso+DVce8vu+HVY1LrStUkPdESN:tkRdqP5E8YVRkVorDeN

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (6374) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks