General

  • Target

    2024-06-16_00b2401ad397fd1d24ad2e1cc43cada3_avoslocker_magniber_revil

  • Size

    6.0MB

  • Sample

    240616-lc2m4asanm

  • MD5

    00b2401ad397fd1d24ad2e1cc43cada3

  • SHA1

    bf39ed616075bb9c2548e8eaa403f8ec6582de42

  • SHA256

    7cebd590ef4918a410d28dab997d87042ac37f1aff63e76bf47b5232c81666e9

  • SHA512

    2ae69f8a8d2e00720b9bf2c6afdc37032c485d85181e1fbc531d00a40a0f6f4012d14290b054623b6a750330e577bbfe3f2efab09af553a442279b02a139d1da

  • SSDEEP

    98304:tA3utc4HTUfGJeO3ADxzbWxbsTZlVkAh0YdtLltLvWf/WPk6ZD5r:auc4QjVHW+lVkAXLlFIW8k1r

Malware Config

Targets

    • Target

      2024-06-16_00b2401ad397fd1d24ad2e1cc43cada3_avoslocker_magniber_revil

    • Size

      6.0MB

    • MD5

      00b2401ad397fd1d24ad2e1cc43cada3

    • SHA1

      bf39ed616075bb9c2548e8eaa403f8ec6582de42

    • SHA256

      7cebd590ef4918a410d28dab997d87042ac37f1aff63e76bf47b5232c81666e9

    • SHA512

      2ae69f8a8d2e00720b9bf2c6afdc37032c485d85181e1fbc531d00a40a0f6f4012d14290b054623b6a750330e577bbfe3f2efab09af553a442279b02a139d1da

    • SSDEEP

      98304:tA3utc4HTUfGJeO3ADxzbWxbsTZlVkAh0YdtLltLvWf/WPk6ZD5r:auc4QjVHW+lVkAXLlFIW8k1r

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks