General
-
Target
7ac245824e104b3720e96597b623e1fd22aeaec59dc379bc1c1d54103387fdd2
-
Size
311KB
-
Sample
240417-qlebdaaf71
-
MD5
fa4e0df9018d327cc65d6cd9d0eccb1c
-
SHA1
15515609a0b000bd397aa35e97328bbe3c53f75e
-
SHA256
7ac245824e104b3720e96597b623e1fd22aeaec59dc379bc1c1d54103387fdd2
-
SHA512
b12c256ebdd1bf32052e8470437b86d9e5c6c8b1e5b807d5901fe9653d4a5e42d4d0b96fc9406677a46182bfcc31ff46dd0cd2095ea52ba5b8f13edc027cf385
-
SSDEEP
6144:oe281P7mpbrAsqU1T35qlVaoFoVI7hXp/SXSJ86gqwQaViAl1BFSpLfkGth:oyipnAsqKslVVhtSe8667ViAjBF6
Behavioral task
behavioral1
Sample
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\Documents\ZfV6ho_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Favorites\Microsoft Websites\ZfV6ho_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Default\ZfV6ho_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\AS58i_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\AS58i_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\AS58i_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
-
Size
719KB
-
MD5
275e4a63fc63c995b3e0d464919f211b
-
SHA1
51d85210c2f621ca14d92a8375ee24d62f9d7f44
-
SHA256
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
-
SHA512
1723fb4a624859cb49f1d00100a44c5104a8a6ee4685b0e0988fa54f929dc7d70d171034577a17db2e6529d6c19b49d2ba023c4c98e9637f92981a3c1a5c9dac
-
SSDEEP
12288:OR8hjUV679Aa4Auw3gveB17cOT1WHWEQTe0udkuHgCNU7SY/qgjjmJ/:quK679Aa4Auw3gveB1TGWEQSzXY/tjq/
Score10/10-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Renames multiple (179) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2