General
-
Target
f810deb1ba171cea5b595c6d3f816127fb182833f7a08a98de93226d4f6a336f.zip
-
Size
422KB
-
Sample
240105-cswbksgbbr
-
MD5
7c7ea973308c53a49eb6451c40c3da93
-
SHA1
b62586e000d4d05bee78b822af67a64fc5031ce8
-
SHA256
d3470cbf411c34cb8fd2b21b7ab70ece9aff8b28e7b50722013ebfcfb26c954b
-
SHA512
ddabaf72d3ad2e09565c3fdc6cbed5ee88fe213f78324fdfca423d44ad857bfb09fecb046d25ae405de11c5bc7062e654c9ee7b2aab3bf63ea587f92d851b151
-
SSDEEP
6144:28d+pVb7UOjQqTHBfiI2Z4XWAtKK8xlW8k1Li8bWuLaVTEJfyrIP3sdQwyeq:rY5rjDTHUf4mXM1Qu1J3t7
Static task
static1
Behavioral task
behavioral1
Sample
f810deb1ba171cea5b595c6d3f816127fb182833f7a08a98de93226d4f6a336f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f810deb1ba171cea5b595c6d3f816127fb182833f7a08a98de93226d4f6a336f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Targets
-
-
Target
f810deb1ba171cea5b595c6d3f816127fb182833f7a08a98de93226d4f6a336f.exe
-
Size
921KB
-
MD5
27fc2796210dc3bfdede6a69ac8fa3dd
-
SHA1
b86ece05d5adbd421b0e50709ce95d25a79ea46e
-
SHA256
f810deb1ba171cea5b595c6d3f816127fb182833f7a08a98de93226d4f6a336f
-
SHA512
983ba7f22cf07abc2348e22b40dc27d0e94f58d5f30d9a7b3e3930f84605f1993b7239c3ed514f0a8d0718f9eb0e66220856b1259d23ed9934e5efc81143528d
-
SSDEEP
24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13GHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxmlI
Score10/10-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Renames multiple (198) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry
-