General
-
Target
e6bb11bd2ed0c75d444d2f130bc5fa874ab62d25938a1d58fa1445f2172d97a1
-
Size
2.0MB
-
Sample
240316-ev1eesde59
-
MD5
d41105ad13c1d5b27ba804a8f476b5be
-
SHA1
f82f46077bdbd0c65c1adf777ffcd9c299393f0d
-
SHA256
e6bb11bd2ed0c75d444d2f130bc5fa874ab62d25938a1d58fa1445f2172d97a1
-
SHA512
b22f718545455f1558b002e555e6ddace068072d822045be3eb4115c0968352351692495875ca3f9a6c25cdd1510fbc25e969327626ff0029238fd6c4ca0eb67
-
SSDEEP
49152:p6Qi5LbV60l14gNb3fXzxaZttFkp/ylZo7r/AjKLjq748k9k:di5LbTlugb3UZtjsf8Ky7Y9k
Static task
static1
Behavioral task
behavioral1
Sample
e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Desktop\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Favorites\MSN Websites\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Default\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Public\Pictures\Sample Pictures\FCcKFEK_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf.exe
-
Size
2.1MB
-
MD5
ccede1200a6e8eff54a358fa1e6d119a
-
SHA1
e62fbe82dc5c1efbdecfd94791e023002d3c178b
-
SHA256
e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf
-
SHA512
d4c7e45c2f509e43b521bfbcd67474ef271fa12088f7a57794ba866cdd41ddd3e9ee8fc776b31dd0a0811e62542b813e97c0f3404f4e416066c1338193f7f6c7
-
SSDEEP
49152:Q6otv8NVQqr7XXpwM+DbhzFG13Dyz6fRG+A+85fbhl7zsPS0mc+8aun:QDB8XQqDXf+D9FG1dp9m5fb37zsf+yn
Score10/10-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
Renames multiple (192) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1