Types header


Name Xorist
Type Crypto Ransomware
Encryption Type XOR or TEA encryption.
Short Description Encrypts user files adding a custom file extension, for example New Text Document.txt.73i80A and extorting for money in return for file decryption.
Symptoms The user may witness his files being encoded along with a ransom message.
Distribution Method Via malicious URLs or file attachments.
Image  Xorist
More Details

This is offered as Raas(ransomware as a service).Once the ransomware gets infected and activated, it drops some of its payload modules that scans and encrypt the files of the victim in one of the following folder

Some of the targets of the Xorist are



Once these are done it modifies the registry entries of victim to make the executables run every time whenever the windows starts. This is done by adding the value and data are added in the following subkey:


Once these process are completed the ransomware starts to scan for the following files and starts to encrypt them: the ransomware targets some specific files and scans them   some of the computer files that are scanned are as shown:

*.zip, *.rar, *.7z, *.tar, *.gzip, *.jpg, *.jpeg, *.psd, *.cdr, *.dwg, *.max, *.bmp, *.gif, *.png, *.doc, *.docx, *.xls, *.xlsx, *.ppt, *.pptx, *.txt, *.pdf, *.djvu, *.htm, *.html, *.mdb, *.cer, *.p12, *.pfx, *.kwm, *.pwm, *.1cd, *.md, *.mdf, *.dbf, *.odt, *.vob, *.ifo, *.lnk, *.torrent, *.mov, *.m2v, *.3gp, *.mpeg, *.mpg, *.flv, *.avi, *.mp4, *.wmv, *.divx, *.mkv, *.mp3, *.wav, *.flac, *.ape, *.wma, *.ac3

Once these are done a help text notepad is left on the victim computer. In which the guidelines are given for decrypting the files.

Xorist ransom payments are handled via SMS, but later on they were changed.