General

  • Target

    JaffaCakes118_2a35a41478d12ed083c6a6fa002aae0a

  • Size

    762KB

  • Sample

    250227-c7jaka1zev

  • MD5

    2a35a41478d12ed083c6a6fa002aae0a

  • SHA1

    32b5648941615552e9425e162ea9bc9b75bc5f49

  • SHA256

    3d4d8653c7e79d8d4c84ee08e5dc9ca6f4bf7e6c934127d09ab00b3c99c28005

  • SHA512

    9e509c35025c05319c8260ad95866668f33aa5e90fefffa714b11120695b9ded4678959ca54a41f148a396f7c23d88be167ba20440e02b0d66e4d1d5e6b60a26

  • SSDEEP

    12288:ys9mgWxvLIoDeEuMRM68+svHAAu2Owre1y9dBxpZs2cwd/jDHlRdzth85:ys9mgWdsoKQNsv9Dj20zf5d/3lRd785

Malware Config

Targets

    • Target

      JaffaCakes118_2a35a41478d12ed083c6a6fa002aae0a

    • Size

      762KB

    • MD5

      2a35a41478d12ed083c6a6fa002aae0a

    • SHA1

      32b5648941615552e9425e162ea9bc9b75bc5f49

    • SHA256

      3d4d8653c7e79d8d4c84ee08e5dc9ca6f4bf7e6c934127d09ab00b3c99c28005

    • SHA512

      9e509c35025c05319c8260ad95866668f33aa5e90fefffa714b11120695b9ded4678959ca54a41f148a396f7c23d88be167ba20440e02b0d66e4d1d5e6b60a26

    • SSDEEP

      12288:ys9mgWxvLIoDeEuMRM68+svHAAu2Owre1y9dBxpZs2cwd/jDHlRdzth85:ys9mgWdsoKQNsv9Dj20zf5d/3lRd785

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2198) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks