General

  • Target

    JaffaCakes118_2f4fdec986709cfd0d8706f2a8036490

  • Size

    331KB

  • Sample

    250227-yxkljaxtgz

  • MD5

    2f4fdec986709cfd0d8706f2a8036490

  • SHA1

    9816c92bb0e3dd0c0422c79ac1c8497fe5080748

  • SHA256

    b7084cafcaf9a78d5373623beb6b8345f89f0611e59cb359094d8dc364baf22b

  • SHA512

    b2eab6522fe809b2e7fc76f22273ca10b838bb9252573824e7ccf0e85c040ea79904302103981d45d5fbe37d6f741f3cb876d9ffdbcaeec072b18737d49da2e9

  • SSDEEP

    768:KYz+023CC7thbq0fIqRWVrwezJDjZK221+SoGH:L+0ltOWVrwiZ56ZH

Malware Config

Targets

    • Target

      JaffaCakes118_2f4fdec986709cfd0d8706f2a8036490

    • Size

      331KB

    • MD5

      2f4fdec986709cfd0d8706f2a8036490

    • SHA1

      9816c92bb0e3dd0c0422c79ac1c8497fe5080748

    • SHA256

      b7084cafcaf9a78d5373623beb6b8345f89f0611e59cb359094d8dc364baf22b

    • SHA512

      b2eab6522fe809b2e7fc76f22273ca10b838bb9252573824e7ccf0e85c040ea79904302103981d45d5fbe37d6f741f3cb876d9ffdbcaeec072b18737d49da2e9

    • SSDEEP

      768:KYz+023CC7thbq0fIqRWVrwezJDjZK221+SoGH:L+0ltOWVrwiZ56ZH

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2193) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks