General
-
Target
xerin-unpacker.zip
-
Size
236KB
-
Sample
241029-t11dyaxamr
-
MD5
b651a3553ab3a5bcb7b214970d472b42
-
SHA1
be3260cd668dac8d35503ad4a99adfa5e742da76
-
SHA256
653f642b866f37fc6d149ee025a318bea8a53ff1a48caa5f2f3d53f08ccb3d71
-
SHA512
f4428046e0b4df072a3f6b690dfd1a64db4823af3482f128480444a4af7a4263c1104d0d0bba76dd2c0041e8e33bcf58aba2f38805ee36d1f1b639e58725b44e
-
SSDEEP
6144:tYt0q+BReFMTsYCccx596gyWBXcuYNoqOE6j:tYt+BReiTmca59ojgX
Static task
static1
Behavioral task
behavioral1
Sample
xerin-unpacker.zip
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
xerin-unpacker.zip
-
Size
236KB
-
MD5
b651a3553ab3a5bcb7b214970d472b42
-
SHA1
be3260cd668dac8d35503ad4a99adfa5e742da76
-
SHA256
653f642b866f37fc6d149ee025a318bea8a53ff1a48caa5f2f3d53f08ccb3d71
-
SHA512
f4428046e0b4df072a3f6b690dfd1a64db4823af3482f128480444a4af7a4263c1104d0d0bba76dd2c0041e8e33bcf58aba2f38805ee36d1f1b639e58725b44e
-
SSDEEP
6144:tYt0q+BReFMTsYCccx596gyWBXcuYNoqOE6j:tYt+BReiTmca59ojgX
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (738) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-