General

  • Target

    JaffaCakes118_4f823f471e3d8bf47beae025c4d46985

  • Size

    36KB

  • Sample

    250304-zgrkks1jx5

  • MD5

    4f823f471e3d8bf47beae025c4d46985

  • SHA1

    107fa36e5c95af503de06a55563693a6c1ebad64

  • SHA256

    a642995fb7ae9985298e04175c77c11392065e26078152da3d027a07cfa2a6ab

  • SHA512

    503e6299e08fb2823d80369764e6c5ace73f15fd8db06ecebc7b4aa5394e754fb0ea340390cf1c6293c9db07b96979da06035752d949fb373b8651ac4c9337ea

  • SSDEEP

    384:f4eSvefsbbdkJ3eVk6d72/5Y/W9hgELqNEOSMr4JtzZa6bqWk6RBzGkyw:QeSmfsa472xY/0mEGNNAtzdl3yw

Malware Config

Targets

    • Target

      JaffaCakes118_4f823f471e3d8bf47beae025c4d46985

    • Size

      36KB

    • MD5

      4f823f471e3d8bf47beae025c4d46985

    • SHA1

      107fa36e5c95af503de06a55563693a6c1ebad64

    • SHA256

      a642995fb7ae9985298e04175c77c11392065e26078152da3d027a07cfa2a6ab

    • SHA512

      503e6299e08fb2823d80369764e6c5ace73f15fd8db06ecebc7b4aa5394e754fb0ea340390cf1c6293c9db07b96979da06035752d949fb373b8651ac4c9337ea

    • SSDEEP

      384:f4eSvefsbbdkJ3eVk6d72/5Y/W9hgELqNEOSMr4JtzZa6bqWk6RBzGkyw:QeSmfsa472xY/0mEGNNAtzdl3yw

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Renames multiple (2169) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks