General
-
Target
2024-11-21_5034bb1e06bde3b9ef44ce72e5b680e1_avoslocker_cobalt-strike_luca-stealer
-
Size
663KB
-
Sample
241121-n9779asjhx
-
MD5
5034bb1e06bde3b9ef44ce72e5b680e1
-
SHA1
227407cbbb205a342a9fd2a6bd5e459aa2f73eff
-
SHA256
e722a12597c11763970e6d431ec2a54a4881aa8fc745ba239b4dbabd647303f0
-
SHA512
9c763a00502d34b6917b43e1f22928c038f65b97d1d12adca12814be9ccc1d6860ecd13b75b190d3fe1110bc7d0c0eeaae8f10e9bb69acb2f66db42c55d74e14
-
SSDEEP
12288:XDiAGc6VBGZLG9PNSx97YoglUw+OeO+OeNhBBhhBBbnt2mS8n3vcUohKivvM2d29:XDiPc6VEZK9PNSx97YonBgmSuA7vlI8B
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_5034bb1e06bde3b9ef44ce72e5b680e1_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_5034bb1e06bde3b9ef44ce72e5b680e1_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\cs-CZ\README_WARNING.txt
Extracted
F:\$RECYCLE.BIN\S-1-5-21-493223053-2004649691-1575712786-1000\README_WARNING.txt
Targets
-
-
Target
2024-11-21_5034bb1e06bde3b9ef44ce72e5b680e1_avoslocker_cobalt-strike_luca-stealer
-
Size
663KB
-
MD5
5034bb1e06bde3b9ef44ce72e5b680e1
-
SHA1
227407cbbb205a342a9fd2a6bd5e459aa2f73eff
-
SHA256
e722a12597c11763970e6d431ec2a54a4881aa8fc745ba239b4dbabd647303f0
-
SHA512
9c763a00502d34b6917b43e1f22928c038f65b97d1d12adca12814be9ccc1d6860ecd13b75b190d3fe1110bc7d0c0eeaae8f10e9bb69acb2f66db42c55d74e14
-
SSDEEP
12288:XDiAGc6VBGZLG9PNSx97YoglUw+OeO+OeNhBBhhBBbnt2mS8n3vcUohKivvM2d29:XDiPc6VEZK9PNSx97YonBgmSuA7vlI8B
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (217) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Modifies file permissions
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Indicator Removal
2File Deletion
2Modify Registry
2