General

  • Target

    99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118

  • Size

    754KB

  • Sample

    241125-gve5laylhj

  • MD5

    99ac20481d26bbdb5e5e990b470d5e43

  • SHA1

    37a12949d6147b33e48d6ae7bb95c8adc502781e

  • SHA256

    04a1c752bb88e842acdf2b0b05f47d9909f5d871b0631da59020ff71532e51d9

  • SHA512

    192695662fabb4aa2a45d53fc457a34582541e3ea308d7e896c7b5c4a185030aad07c4a25d2be34bbb4b70c1b58e94ca1e7b4a4a11f26c5923a8a7ac829f6f05

  • SSDEEP

    768:2n+CJMZ07MwvFmmELPZjE+RDUIsN+LpkSC34NPBkhLQ+:bCJMZ0IwvFm/PBEwDU5QmmPd

Malware Config

Targets

    • Target

      99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118

    • Size

      754KB

    • MD5

      99ac20481d26bbdb5e5e990b470d5e43

    • SHA1

      37a12949d6147b33e48d6ae7bb95c8adc502781e

    • SHA256

      04a1c752bb88e842acdf2b0b05f47d9909f5d871b0631da59020ff71532e51d9

    • SHA512

      192695662fabb4aa2a45d53fc457a34582541e3ea308d7e896c7b5c4a185030aad07c4a25d2be34bbb4b70c1b58e94ca1e7b4a4a11f26c5923a8a7ac829f6f05

    • SSDEEP

      768:2n+CJMZ07MwvFmmELPZjE+RDUIsN+LpkSC34NPBkhLQ+:bCJMZ0IwvFm/PBEwDU5QmmPd

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2217) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks