Malware Analysis Report

2024-10-16 03:28

Sample ID 220123-q9yd6agah7
Target 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.7z
SHA256 df480deb191b335dcbc3d4fc5d59594cb38caee2aaef8d877fbbc573de741301
Tags
avoslocker ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

df480deb191b335dcbc3d4fc5d59594cb38caee2aaef8d877fbbc573de741301

Threat Level: Known bad

The file 6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.7z was found to be: Known bad.

Malicious Activity Summary

avoslocker ransomware

Avoslocker Ransomware

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-23 13:58

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-23 13:58

Reported

2022-01-23 13:58

Platform

win10-en-20211208

Max time kernel

2s

Max time network

5s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"

Signatures

Avoslocker Ransomware

ransomware avoslocker

Processes

C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe

"C:\Users\Admin\AppData\Local\Temp\6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe"

Network

Files

N/A