General

  • Target

    735dbbfa211a0daae417dd9d9d44490a9053c4b9963923c954528c49366e28d0.exe

  • Size

    7KB

  • Sample

    241205-jlbf6avmfw

  • MD5

    bbf16f6cc96daed3d907ca260f542334

  • SHA1

    85720c94e0a73bc1c8690d3d88eaef9989a36bf3

  • SHA256

    735dbbfa211a0daae417dd9d9d44490a9053c4b9963923c954528c49366e28d0

  • SHA512

    85480b003ba7d3b848cc5cb7949c6955adc9fe119cf62f5ea4163efa16390222cb14fc5ee4512a37d5e385952673ab50dfeafb2ca5c019d33423e3508b4fec87

  • SSDEEP

    96:1AZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExAQbodG7GqqKZMUAi:uzdrr1FG1WDCgmjPZA2ZpZMUAi

Malware Config

Targets

    • Target

      735dbbfa211a0daae417dd9d9d44490a9053c4b9963923c954528c49366e28d0.exe

    • Size

      7KB

    • MD5

      bbf16f6cc96daed3d907ca260f542334

    • SHA1

      85720c94e0a73bc1c8690d3d88eaef9989a36bf3

    • SHA256

      735dbbfa211a0daae417dd9d9d44490a9053c4b9963923c954528c49366e28d0

    • SHA512

      85480b003ba7d3b848cc5cb7949c6955adc9fe119cf62f5ea4163efa16390222cb14fc5ee4512a37d5e385952673ab50dfeafb2ca5c019d33423e3508b4fec87

    • SSDEEP

      96:1AZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExAQbodG7GqqKZMUAi:uzdrr1FG1WDCgmjPZA2ZpZMUAi

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2186) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks