General

  • Target

    2024-04-30_7feb5b96fba211ec445788fbac87dcab_avoslocker

  • Size

    9.7MB

  • Sample

    240430-ytlpesgf97

  • MD5

    7feb5b96fba211ec445788fbac87dcab

  • SHA1

    97bc8df03ba99714a50179ba9cb7e54e972af886

  • SHA256

    1b92b8e3c2cd63b788c6689b62dc6f91f3abce211821e8169fd20aa96fc614a0

  • SHA512

    f6cad309981087b8549b7d69dbee04471053b09cac3cd389400350d466376c643e4dbcb680a187b1f325b0b52dfd443ae602ff90810fe1d28c471c8e81b12397

  • SSDEEP

    196608:wlGKhkfvi9X4VwGKhkfvi9X4mta8nXe12EYtHHSO8LTOFM2JwfuQB:wlGKifK9cwGKifK9PZnXe12H9SOGTOFS

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

18.231.93.153:13655

Targets

    • Target

      2024-04-30_7feb5b96fba211ec445788fbac87dcab_avoslocker

    • Size

      9.7MB

    • MD5

      7feb5b96fba211ec445788fbac87dcab

    • SHA1

      97bc8df03ba99714a50179ba9cb7e54e972af886

    • SHA256

      1b92b8e3c2cd63b788c6689b62dc6f91f3abce211821e8169fd20aa96fc614a0

    • SHA512

      f6cad309981087b8549b7d69dbee04471053b09cac3cd389400350d466376c643e4dbcb680a187b1f325b0b52dfd443ae602ff90810fe1d28c471c8e81b12397

    • SSDEEP

      196608:wlGKhkfvi9X4VwGKhkfvi9X4mta8nXe12EYtHHSO8LTOFM2JwfuQB:wlGKifK9cwGKifK9PZnXe12H9SOGTOFS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks