General
-
Target
73f5a6b77c0daff7ccbcceed4143d46f8dfe1d419687fad9ab3b1ec7a4bbccaf
-
Size
311KB
-
Sample
240417-qw4zsahh43
-
MD5
1cb35a2ac0269d3e29ed4386771343fd
-
SHA1
934c108a917889a5346cf32696254a494f3215ba
-
SHA256
73f5a6b77c0daff7ccbcceed4143d46f8dfe1d419687fad9ab3b1ec7a4bbccaf
-
SHA512
b20586aef99d4ed3232e3e43893ff33e49391efe2bb7f084346609dd842c82e229d97d0196632c7994b73c1bf5c785c12e0093973a4cba778e485b0ead5db0ab
-
SSDEEP
6144:JclSnQLpCWqqGiJ+s+CYQlpP4rQPb9BZlE7RGf7PTyYPU260i1Xj:2wnIj7h+roZlWR67PmO1bi1T
Behavioral task
behavioral1
Sample
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\Desktop\GxDf8_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\A1s9w_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\A1s9w_readme_.txt
avaddon
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
-
Size
719KB
-
MD5
275e4a63fc63c995b3e0d464919f211b
-
SHA1
51d85210c2f621ca14d92a8375ee24d62f9d7f44
-
SHA256
cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
-
SHA512
1723fb4a624859cb49f1d00100a44c5104a8a6ee4685b0e0988fa54f929dc7d70d171034577a17db2e6529d6c19b49d2ba023c4c98e9637f92981a3c1a5c9dac
-
SSDEEP
12288:OR8hjUV679Aa4Auw3gveB17cOT1WHWEQTe0udkuHgCNU7SY/qgjjmJ/:quK679Aa4Auw3gveB1TGWEQSzXY/tjq/
Score10/10-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Renames multiple (170) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2