General

  • Target

    fca2d02c8af8a1084513c1b0f7078700_JaffaCakes118

  • Size

    7KB

  • Sample

    241218-w2hxdsykcq

  • MD5

    fca2d02c8af8a1084513c1b0f7078700

  • SHA1

    0fe92bb1476edf9c64b725711ecf9d6c6cb086c4

  • SHA256

    0e37bed0e9e55676ac240e7af67921175505f24cb2b56f13cb6dfd82c1d868b4

  • SHA512

    7106f795430cb92c55d00d0aebd600319c31b29730e061307d67594de661cdea950f5daad0187b21d20197e8c15454ccc22d847bd1334a473d78d2b297e1da92

  • SSDEEP

    96:liZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExriyFqzyfs/+GeZUeGMB:Uzdrr1FG1WDCgmjPZRYOE/5eRGMUA

Malware Config

Targets

    • Target

      fca2d02c8af8a1084513c1b0f7078700_JaffaCakes118

    • Size

      7KB

    • MD5

      fca2d02c8af8a1084513c1b0f7078700

    • SHA1

      0fe92bb1476edf9c64b725711ecf9d6c6cb086c4

    • SHA256

      0e37bed0e9e55676ac240e7af67921175505f24cb2b56f13cb6dfd82c1d868b4

    • SHA512

      7106f795430cb92c55d00d0aebd600319c31b29730e061307d67594de661cdea950f5daad0187b21d20197e8c15454ccc22d847bd1334a473d78d2b297e1da92

    • SSDEEP

      96:liZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExriyFqzyfs/+GeZUeGMB:Uzdrr1FG1WDCgmjPZRYOE/5eRGMUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2198) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks