General

  • Target

    9ee6a1e0908942d5cb68a520938698b0_JaffaCakes118

  • Size

    7KB

  • Sample

    241126-a8g3sasken

  • MD5

    9ee6a1e0908942d5cb68a520938698b0

  • SHA1

    413957f1423fd818ad9fd1d4abb0d71e6bdaeb0a

  • SHA256

    d7090f86736e59bd0a0424d1c72e64f5bb2807e6ac58666ba6fedadfc3f88ce7

  • SHA512

    c183e3d1cb2ca11b2dfd2c5e3e6497f2644adda5da57624cd8c839e2204e94d001fe7dcc524d85eaacabce301eaf05defde6b82ac8e2b9e52ae864aceb72788e

  • SSDEEP

    96:V6Zhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExdWZ6YUhx45MUA:4zdrr1FG1WDCgmjPZdWCx45MUA

Malware Config

Targets

    • Target

      9ee6a1e0908942d5cb68a520938698b0_JaffaCakes118

    • Size

      7KB

    • MD5

      9ee6a1e0908942d5cb68a520938698b0

    • SHA1

      413957f1423fd818ad9fd1d4abb0d71e6bdaeb0a

    • SHA256

      d7090f86736e59bd0a0424d1c72e64f5bb2807e6ac58666ba6fedadfc3f88ce7

    • SHA512

      c183e3d1cb2ca11b2dfd2c5e3e6497f2644adda5da57624cd8c839e2204e94d001fe7dcc524d85eaacabce301eaf05defde6b82ac8e2b9e52ae864aceb72788e

    • SSDEEP

      96:V6Zhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExdWZ6YUhx45MUA:4zdrr1FG1WDCgmjPZdWCx45MUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2204) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks