Resubmissions
12-01-2025 13:19
250112-qkzkxswnaq 1012-01-2025 13:17
250112-qjr5fswmfp 1012-01-2025 13:15
250112-qhcclstlgt 10Analysis
-
max time kernel
70s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-01-2025 13:17
Behavioral task
behavioral1
Sample
bin/Encoder_Builder_v2.4.exe
Resource
win11-20241023-en
windows11-21h2-x64
4 signatures
900 seconds
General
-
Target
bin/Encoder_Builder_v2.4.exe
-
Size
883KB
-
MD5
4c824eb8598f175d41e9a2ea06129890
-
SHA1
64b57ea796956cbb60ce4fc702239cbc395aee6f
-
SHA256
7a57d83ae7fde49cfd57e7d2753570306a09c6082bc82f75c89d23fa650a0011
-
SHA512
122e509a3101a67d867f7a3653c8e5d2f838a04c7cb6a97af52e6b35ad709099a3b5940bca48be225ef0d8403537150f232f6137689180a6fd62affef5114845
-
SSDEEP
24576:LIzxV583IWM6MV1KB7pgLB5rnjjUafpVMUXfnuq:8zT5oarn0KtX2q
Score
10/10
Malware Config
Signatures
-
Detected Xorist Ransomware 2 IoCs
resource yara_rule behavioral1/memory/4792-1-0x0000000000400000-0x00000000004E2000-memory.dmp family_xorist behavioral1/memory/4792-3-0x0000000000400000-0x00000000004E2000-memory.dmp family_xorist -
Xorist Ransomware
Xorist is a ransomware first seen in 2020.
-
Xorist family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Encoder_Builder_v2.4.exe