General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.7z
-
Size
341KB
-
Sample
220927-trxxfsdhc8
-
MD5
0b8b52ccdcad80f2bd9f3ac1088bf9c4
-
SHA1
a1b35bc12d60e6c3eb00dd1174e47b6046a3e72a
-
SHA256
df480deb191b335dcbc3d4fc5d59594cb38caee2aaef8d877fbbc573de741301
-
SHA512
0147f02113c6ad29955727f873e2b6206dbbcbf0c129b624ae7b36c340e04288b7547034bc06261b18f123a47b4d575929bb92d618c46d4dd6d5420d2b4ae5e4
-
SSDEEP
6144:fs7Kf3dQexXASk6/fnmX70P6dmVPWd2pb6k3epZv3qCFjh72V/fSeWNhDmuqH/O8:f+iNQexQonmwiUCIkfSwyI0u8/OcLhP
Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
avoslocker
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Targets
-
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2
-
Size
919KB
-
MD5
40f2238875fcbd2a92cfefc4846a15a8
-
SHA1
06dce6a5df6ee0099602863a47e2cdeea4e34764
-
SHA256
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2
-
SHA512
8ab1a2124a67e91a4e1842b5f600f977d3d72d398b64ee690c297a04b733e60e01fe4383a1fdf25bb412bc1294d69c5402bd60159c3125bdfb709d024c8e04b8
-
SSDEEP
24576:ID7x8JDwepWTu/g6YvOkAT5OdAP6tfKf2J9lb:Ifx8JDwepWaOvOkANOdS6BT9V
Score10/10-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-