General

  • Target

    fe6550da85f85e7c7eba13b67059c27c_JaffaCakes118

  • Size

    7KB

  • Sample

    241219-et2wvsylgk

  • MD5

    fe6550da85f85e7c7eba13b67059c27c

  • SHA1

    19ca7b595d47f254040551725a8d50bcca564cc1

  • SHA256

    fedaed2ba9d817383802e8cc19a64b9e08bcfc729cfb0dc710ec87f945589ef7

  • SHA512

    2b967097170aa5b3ae974ed8e2fdc67545adad4629c28e5cdce6e5f64ddfb9969dd875a41a749752b5abc1abdef7d5ecf08919c45522b679cde1d57b6f3d1c69

  • SSDEEP

    96:l2Zhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExZO2HJSEbUZMUA:wzdrr1FG1WDCgmjPZZO2pXUZMUA

Malware Config

Targets

    • Target

      fe6550da85f85e7c7eba13b67059c27c_JaffaCakes118

    • Size

      7KB

    • MD5

      fe6550da85f85e7c7eba13b67059c27c

    • SHA1

      19ca7b595d47f254040551725a8d50bcca564cc1

    • SHA256

      fedaed2ba9d817383802e8cc19a64b9e08bcfc729cfb0dc710ec87f945589ef7

    • SHA512

      2b967097170aa5b3ae974ed8e2fdc67545adad4629c28e5cdce6e5f64ddfb9969dd875a41a749752b5abc1abdef7d5ecf08919c45522b679cde1d57b6f3d1c69

    • SSDEEP

      96:l2Zhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExZO2HJSEbUZMUA:wzdrr1FG1WDCgmjPZZO2pXUZMUA

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2198) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks