General
-
Target
sex.exe
-
Size
3.2MB
-
Sample
241229-apr4mswqfn
-
MD5
9e85a92de58c89babecf27e74f85d3f4
-
SHA1
d955b86d566325a2ac8960b45c2cf336ddac4717
-
SHA256
4b0f1abf2abfd7a9a291425227844bf98b3aa0ac499268b52f69f297bda90839
-
SHA512
84e094d097ed6ac187d7d301d6a772ca59cfebc829e63cca70685d7176111a3afbad4ff4908932b0ec436a34a302fd53a4fce97aeda126796daab5b130fc72d9
-
SSDEEP
24576:8SUpZr3y2amHY6MdefqTXeZty61kSSTKa7WsUS2VSs+stModjGdbzfDUBB355zs/:oZat81wua7bUScTLTXO+2NwL5ljasaU
Static task
static1
Behavioral task
behavioral1
Sample
sex.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sex.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
sex.exe
-
Size
3.2MB
-
MD5
9e85a92de58c89babecf27e74f85d3f4
-
SHA1
d955b86d566325a2ac8960b45c2cf336ddac4717
-
SHA256
4b0f1abf2abfd7a9a291425227844bf98b3aa0ac499268b52f69f297bda90839
-
SHA512
84e094d097ed6ac187d7d301d6a772ca59cfebc829e63cca70685d7176111a3afbad4ff4908932b0ec436a34a302fd53a4fce97aeda126796daab5b130fc72d9
-
SSDEEP
24576:8SUpZr3y2amHY6MdefqTXeZty61kSSTKa7WsUS2VSs+stModjGdbzfDUBB355zs/:oZat81wua7bUScTLTXO+2NwL5ljasaU
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (10416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1