General

  • Target

    150706758889bd0ae457f71a1160ae96824ef0001cbce53545994a253310b4b5

  • Size

    541KB

  • Sample

    240417-qxagkabe2y

  • MD5

    9664cc3a65a642349367d2941b02c00b

  • SHA1

    a1dd859b1d9671907f6cc95b2749a87471bba13c

  • SHA256

    150706758889bd0ae457f71a1160ae96824ef0001cbce53545994a253310b4b5

  • SHA512

    872713c93f9ba716fd6e2b7df3068bda28ac12b102c68ebc436dd1dbd81227d972ce8b425dcefb34c3827d885b4b48834cd94c7d9bbe14a78bc5d1f8f23d86db

  • SSDEEP

    12288:5QfGxYnqMeYGdQkn1RwLXJHeM+Rzv/Vv2ryjRwPAP:hqeYeQW1MJH6/VOryjqW

Malware Config

Targets

    • Target

      10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952.exe

    • Size

      798KB

    • MD5

      202dd42eee0197f8951ca6b115432b30

    • SHA1

      5d1a4fb62b88e28a46f1988cf0f7b035b28d424d

    • SHA256

      10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952

    • SHA512

      3a844c0493df3521fce56d454aab73221bda5a3a65f98b14d36975537b9df2fe5209e1c884736b5b3da5ae2b4a76225b4ffa751674d3802dfcef75cc5573d15b

    • SSDEEP

      12288:uafx644Z97eXJM/0bsXGwCqjwEDBlf9plvnSAq:zA44bSPs2wwEDBnplaAq

    • Avaddon

      Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.

    • Avaddon payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (191) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks