General

  • Target

    e08d6963abd974a0dcc9bc86f67edf4e_JaffaCakes118

  • Size

    167KB

  • Sample

    241211-jw15kaymfn

  • MD5

    e08d6963abd974a0dcc9bc86f67edf4e

  • SHA1

    6b7f8c57d6f67540b4545bd1bd52a4818516ca59

  • SHA256

    7ab5cc70f8b5777a3c55d6b9a84500d1796af80f3d558ba62516f21f384fbaa3

  • SHA512

    8315191960b1e0f60d76c6c0c2539a85de05050d75731fdb5227edc6696a47545687a39921939d877e52fecad432536b5a12b6a086d94f3da7951b4b6f739689

  • SSDEEP

    3072:4rI+ZEBpDEdMYsQj0pK/TYcIR2VYYYS2zUYYvYYUpo97:4X6u7e

Malware Config

Targets

    • Target

      e08d6963abd974a0dcc9bc86f67edf4e_JaffaCakes118

    • Size

      167KB

    • MD5

      e08d6963abd974a0dcc9bc86f67edf4e

    • SHA1

      6b7f8c57d6f67540b4545bd1bd52a4818516ca59

    • SHA256

      7ab5cc70f8b5777a3c55d6b9a84500d1796af80f3d558ba62516f21f384fbaa3

    • SHA512

      8315191960b1e0f60d76c6c0c2539a85de05050d75731fdb5227edc6696a47545687a39921939d877e52fecad432536b5a12b6a086d94f3da7951b4b6f739689

    • SSDEEP

      3072:4rI+ZEBpDEdMYsQj0pK/TYcIR2VYYYS2zUYYvYYUpo97:4X6u7e

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2531) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks