General

  • Target

    bdd5ccf77ee8b5ce2b00c50f5b2c0910_JaffaCakes118

  • Size

    116KB

  • Sample

    241203-rxh95syqfw

  • MD5

    bdd5ccf77ee8b5ce2b00c50f5b2c0910

  • SHA1

    8ef2108c1c4756a5686618d280851aec77b6c0f1

  • SHA256

    056f76a1e2ed80c2dd1f4244a58b596350401aac3074320ea23e6da2aca0a78d

  • SHA512

    978e00bad5550c0c6997ebb6affbb9018920c7a55174071873809f40a3fab84b8b7c469f772f4d02de01f3d032d768197af39670fd5c52380f5a530ad3603000

  • SSDEEP

    1536:ar4k+OoUPdn5a6r+f57thh3hPhGhxlqJZ1h+yOuOlXc5FbCpKYykhlSt8cuWDUaQ:arZV5a3lpY/7St8c97wFwe

Malware Config

Targets

    • Target

      bdd5ccf77ee8b5ce2b00c50f5b2c0910_JaffaCakes118

    • Size

      116KB

    • MD5

      bdd5ccf77ee8b5ce2b00c50f5b2c0910

    • SHA1

      8ef2108c1c4756a5686618d280851aec77b6c0f1

    • SHA256

      056f76a1e2ed80c2dd1f4244a58b596350401aac3074320ea23e6da2aca0a78d

    • SHA512

      978e00bad5550c0c6997ebb6affbb9018920c7a55174071873809f40a3fab84b8b7c469f772f4d02de01f3d032d768197af39670fd5c52380f5a530ad3603000

    • SSDEEP

      1536:ar4k+OoUPdn5a6r+f57thh3hPhGhxlqJZ1h+yOuOlXc5FbCpKYykhlSt8cuWDUaQ:arZV5a3lpY/7St8c97wFwe

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2192) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks