General

  • Target

    01aa2cf8db4badde36f1896d341e31c0fe91a51772f1aa50b9f59ba368973993.zip

  • Size

    1023KB

  • Sample

    240402-l58bcaeb6s

  • MD5

    4ba656f5864f67f07d7d7832e9533924

  • SHA1

    7d94a0eb12c5a5d09844232313b414625d8bd25e

  • SHA256

    0340302e5183329eb829f632de0c22bdb0a41282dd80be2a90bf2d6608aa113d

  • SHA512

    a6a9c8505a223f833c9badcd806d41978576fbb9ac4d4b883e2b77b23c47c8d3dd8c583dfb8f0bb2fce47128cb87cf8a116f2ad483f7608158f97459b43a7935

  • SSDEEP

    24576:sAFBWsBowNL6bLZh9LnJO82e/UQFhVhfh7Q32MECN:sAHjoXhhnOvyhfh7Q32Tg

Malware Config

Targets

    • Target

      01aa2cf8db4badde36f1896d341e31c0fe91a51772f1aa50b9f59ba368973993.exe

    • Size

      2.0MB

    • MD5

      f8290f2d593a05ea811edbd3bff6eacc

    • SHA1

      497985116f4ebaa05f1774c16adb5aa52b8e9756

    • SHA256

      01aa2cf8db4badde36f1896d341e31c0fe91a51772f1aa50b9f59ba368973993

    • SHA512

      97e4563b6112e4f6c7ee46cc1e18de931d4e052d387e6c37f7fdd7d352ef817778bd95041eeaf05e2bdf657afa1b09e52f4933ca22c6ea8f98983d8c13b56c14

    • SSDEEP

      24576:AxT2+3dmY7FF1JLurH0q7kRZLJn0A0ffqN3CzPtakNLIE4GPoyP:f+NmY7FFHurUayLLKCdCzPtFZb

    • Avaddon

      Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.

    • Avaddon payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (194) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

3
T1112

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

2
T1490

Tasks