General

  • Target

    da6d58d8bc92d4ec15df694d5b19a534_JaffaCakes118

  • Size

    59KB

  • Sample

    241209-tkegjaxrhn

  • MD5

    da6d58d8bc92d4ec15df694d5b19a534

  • SHA1

    13e5c37b3818042f7c75292df46ec316a06d979b

  • SHA256

    40081196bc2112140558f6ab16eef47b926aeb1fceb654eb6b73be300974ea37

  • SHA512

    74cef8724cc1ba0c528be0147f4d5e5ba7382a6ac94bfc3a0deacbe88231cfe7e109e5bc804f6eeae668081d0b57654f0dbfe7356f9094b3039027c78bb3141f

  • SSDEEP

    1536:8r4xKozKYkcfYFaT630yoxAkWJ50FE32THYi:8rczKYkhaKtFJP32

Malware Config

Targets

    • Target

      da6d58d8bc92d4ec15df694d5b19a534_JaffaCakes118

    • Size

      59KB

    • MD5

      da6d58d8bc92d4ec15df694d5b19a534

    • SHA1

      13e5c37b3818042f7c75292df46ec316a06d979b

    • SHA256

      40081196bc2112140558f6ab16eef47b926aeb1fceb654eb6b73be300974ea37

    • SHA512

      74cef8724cc1ba0c528be0147f4d5e5ba7382a6ac94bfc3a0deacbe88231cfe7e109e5bc804f6eeae668081d0b57654f0dbfe7356f9094b3039027c78bb3141f

    • SSDEEP

      1536:8r4xKozKYkcfYFaT630yoxAkWJ50FE32THYi:8rczKYkhaKtFJP32

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (4279) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks