General

  • Target

    f5f61535258ba0a7120a34ea5fda5b70_JaffaCakes118

  • Size

    40KB

  • Sample

    241215-13wxvs1mbk

  • MD5

    f5f61535258ba0a7120a34ea5fda5b70

  • SHA1

    10b03d523b4342e659d1a6fcc3cd442576be52cc

  • SHA256

    d5f089b24f91f71ea717f61439ef7d22a7428d3ed8afc153a42a4f6f1d3bd034

  • SHA512

    6a55e1d44468e913a0311e0862030136ec2f8f9dee6cf417c07bb141064c4a4a8ad6c8ae4da22c39ab6642f16426e104e419116eacc20b426f730994bdf35b4c

  • SSDEEP

    384:6ebFNw4Pk1itKkpAjjalrbL1cqqYvjSzkDCgStzRfMB:60FmBkpKjsZchY7bDCdz2

Malware Config

Targets

    • Target

      f5f61535258ba0a7120a34ea5fda5b70_JaffaCakes118

    • Size

      40KB

    • MD5

      f5f61535258ba0a7120a34ea5fda5b70

    • SHA1

      10b03d523b4342e659d1a6fcc3cd442576be52cc

    • SHA256

      d5f089b24f91f71ea717f61439ef7d22a7428d3ed8afc153a42a4f6f1d3bd034

    • SHA512

      6a55e1d44468e913a0311e0862030136ec2f8f9dee6cf417c07bb141064c4a4a8ad6c8ae4da22c39ab6642f16426e104e419116eacc20b426f730994bdf35b4c

    • SSDEEP

      384:6ebFNw4Pk1itKkpAjjalrbL1cqqYvjSzkDCgStzRfMB:60FmBkpKjsZchY7bDCdz2

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (3327) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks