General
-
Target
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3
-
Size
762KB
-
Sample
240315-qwqr6ahf21
-
MD5
763217378a83acd3712728a51bec6862
-
SHA1
62b23d984ba0539b263bf929847a6f79ed7e5a89
-
SHA256
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3
-
SHA512
d566ac0460aa76ea63d49308690dc6f8113bc5f811a1862218d09f92bffbeaee1b6e9771766f8b8e23b34a2026f80c1fe9dcb0d39f2aca3f267e75e24b63b486
-
SSDEEP
12288:wovdmyrrMXMNK+A+JLxkpheaiTOYqLNMhL3q/Pn75K1/LnBuueiFZMmmk3:woQEY+A+JLxcheaiTOYI+xOPn75+D/ZL
Behavioral task
behavioral1
Sample
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Desktop\wPhf8_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\wPhf8_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\OvtlQeYE_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Music\OvtlQeYE_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\OvtlQeYE_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3
-
Size
762KB
-
MD5
763217378a83acd3712728a51bec6862
-
SHA1
62b23d984ba0539b263bf929847a6f79ed7e5a89
-
SHA256
9f8f217060e6f2d821f1f0bb17bbd97a26d4ea4b9e70316e6a4b836273eaccd3
-
SHA512
d566ac0460aa76ea63d49308690dc6f8113bc5f811a1862218d09f92bffbeaee1b6e9771766f8b8e23b34a2026f80c1fe9dcb0d39f2aca3f267e75e24b63b486
-
SSDEEP
12288:wovdmyrrMXMNK+A+JLxkpheaiTOYqLNMhL3q/Pn75K1/LnBuueiFZMmmk3:woQEY+A+JLxcheaiTOYI+xOPn75+D/ZL
Score10/10-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (187) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2