General
-
Target
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a
-
Size
602KB
-
Sample
240531-lgap6seb57
-
MD5
200098f76839127e1c8a490fc97c5088
-
SHA1
21c7b77f2ab898c25a6677a99b0f0a0dc27c549d
-
SHA256
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a
-
SHA512
f9735134db8d8eb60c7d3cd4bb0d1d17f3066fe11112f3fb71eda76596464fb61515c63dad6b2ddb4cb4c95672c642b344914b668d8cb21b1dd2ef69323f3e38
-
SSDEEP
12288:rx2s0jR0yePLpyYffiXbXWBq6eOfDTq0UmAlwtK3utfqBB9pcp:rL0jRkckfnBq8fn9UmAx4iH9pcp
Static task
static1
Behavioral task
behavioral1
Sample
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-268080393-3149932598-1824759070-1000\GET_YOUR_FILES_BACK.txt
avoslocker
http://avos2fuj6olp6x36.onion
http://avos53nnmi4u6amh.onion/
Targets
-
-
Target
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a
-
Size
602KB
-
MD5
200098f76839127e1c8a490fc97c5088
-
SHA1
21c7b77f2ab898c25a6677a99b0f0a0dc27c549d
-
SHA256
1463611b7b46fc5489c8ce287caa8e6faf0eef4c429ad996dee3f64c7c39d29a
-
SHA512
f9735134db8d8eb60c7d3cd4bb0d1d17f3066fe11112f3fb71eda76596464fb61515c63dad6b2ddb4cb4c95672c642b344914b668d8cb21b1dd2ef69323f3e38
-
SSDEEP
12288:rx2s0jR0yePLpyYffiXbXWBq6eOfDTq0UmAlwtK3utfqBB9pcp:rL0jRkckfnBq8fn9UmAx4iH9pcp
Score10/10-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Renames multiple (75) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-