General
-
Target
sex.exe
-
Size
1.6MB
-
Sample
241229-amjpgswphl
-
MD5
6bd9e9d6f55a5491d8b24768023ab9d7
-
SHA1
2a5c3b978530bb2cdc981ccf52dd58a41010bc4e
-
SHA256
7859dd2f4c9797122bfe2097c5d17279c4050471c67110f95906ac152fec76a2
-
SHA512
1cd39b1d85bd9ae6d1399cd8d0e4d878b0602cd068750bb349b9c6d143d571baaab81e559e1f8cfb769ad5e1b1e0aad605b1f912ca768c554229215e218f8e18
-
SSDEEP
24576:1Imw98okVgela0as5CqLVO7XJCjkD3N0HRAxV0aEhbHdn0TrldepPZ:LL5ljasaUKeaEhDF
Static task
static1
Behavioral task
behavioral1
Sample
sex.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sex.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
sex.exe
-
Size
1.6MB
-
MD5
6bd9e9d6f55a5491d8b24768023ab9d7
-
SHA1
2a5c3b978530bb2cdc981ccf52dd58a41010bc4e
-
SHA256
7859dd2f4c9797122bfe2097c5d17279c4050471c67110f95906ac152fec76a2
-
SHA512
1cd39b1d85bd9ae6d1399cd8d0e4d878b0602cd068750bb349b9c6d143d571baaab81e559e1f8cfb769ad5e1b1e0aad605b1f912ca768c554229215e218f8e18
-
SSDEEP
24576:1Imw98okVgela0as5CqLVO7XJCjkD3N0HRAxV0aEhbHdn0TrldepPZ:LL5ljasaUKeaEhDF
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9660) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1