General

  • Target

    b8ae8229c6b527ebbddbcc2b65b1de80_JaffaCakes118

  • Size

    7KB

  • Sample

    241202-rw1g2axpav

  • MD5

    b8ae8229c6b527ebbddbcc2b65b1de80

  • SHA1

    f1716b5666973c58c8a68823cbb4f24f8fe970bf

  • SHA256

    074b703e4832453699f19df6aa6d95b71f30e3d642ac39671fc5d771faea3ae4

  • SHA512

    6396f8d8c8519924fc249160c92d2f317bebeda956a9a00256f64d1c5310e36b65aae760fc7c005e773c94bb080e7261107a4a9657a26cefd12f4cb5a8d951c7

  • SSDEEP

    96:FGiZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExR3fItgvhxp97pPLmo0:cizdrr1FG1WDCgmjPZF1DCoMUA

Malware Config

Targets

    • Target

      b8ae8229c6b527ebbddbcc2b65b1de80_JaffaCakes118

    • Size

      7KB

    • MD5

      b8ae8229c6b527ebbddbcc2b65b1de80

    • SHA1

      f1716b5666973c58c8a68823cbb4f24f8fe970bf

    • SHA256

      074b703e4832453699f19df6aa6d95b71f30e3d642ac39671fc5d771faea3ae4

    • SHA512

      6396f8d8c8519924fc249160c92d2f317bebeda956a9a00256f64d1c5310e36b65aae760fc7c005e773c94bb080e7261107a4a9657a26cefd12f4cb5a8d951c7

    • SSDEEP

      96:FGiZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExR3fItgvhxp97pPLmo0:cizdrr1FG1WDCgmjPZF1DCoMUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2216) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks