General

  • Target

    f9b35851b1df0d9c5dd5c0538b983265_JaffaCakes118

  • Size

    74KB

  • Sample

    241218-cnlxcazkhm

  • MD5

    f9b35851b1df0d9c5dd5c0538b983265

  • SHA1

    ce61134ea776e13ad003ea110ea2da513a241833

  • SHA256

    01ff93c24ee23fd5842e7fb3890edc8684aa91d241b3deaa9f6aa3cc316a3888

  • SHA512

    412469517e411288e10df11d5171cffd3cdbf468aff95bfbb208734c758fc1875c18030ad505b51eb2ae75dec0af52d2c344703f1aab4aeb75b4751c3bae18a8

  • SSDEEP

    1536:yr4ljTjLvEhAmusWU4YF59sNQTUbNrLuX:yrszLvEh1WU59sNQTUbRq

Malware Config

Targets

    • Target

      f9b35851b1df0d9c5dd5c0538b983265_JaffaCakes118

    • Size

      74KB

    • MD5

      f9b35851b1df0d9c5dd5c0538b983265

    • SHA1

      ce61134ea776e13ad003ea110ea2da513a241833

    • SHA256

      01ff93c24ee23fd5842e7fb3890edc8684aa91d241b3deaa9f6aa3cc316a3888

    • SHA512

      412469517e411288e10df11d5171cffd3cdbf468aff95bfbb208734c758fc1875c18030ad505b51eb2ae75dec0af52d2c344703f1aab4aeb75b4751c3bae18a8

    • SSDEEP

      1536:yr4ljTjLvEhAmusWU4YF59sNQTUbNrLuX:yrszLvEh1WU59sNQTUbRq

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (1848) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks