General

  • Target

    test.exe

  • Size

    1.2MB

  • Sample

    241229-f16dastmfl

  • MD5

    504fc83d83e74187898fa5e48f7aa755

  • SHA1

    0a5c61c8a21df9c5a84424e1024caa1efd336b4f

  • SHA256

    6691acccbdf4630f8bb6d491484976150c5d88688f997f8456b1d18f806b4ede

  • SHA512

    7b5c470bdf915487c480b4f713e8d5d505d2464f4170f271a70c766ed3b7c21124445a7c76acf651519c428ad319c0d634ade7b0bbbb7a769598ce0c8b110066

  • SSDEEP

    24576:GImw98okVgela0as5CqLVO7XJCjkD3N0HRAiy:4L5ljasaU

Malware Config

Targets

    • Target

      test.exe

    • Size

      1.2MB

    • MD5

      504fc83d83e74187898fa5e48f7aa755

    • SHA1

      0a5c61c8a21df9c5a84424e1024caa1efd336b4f

    • SHA256

      6691acccbdf4630f8bb6d491484976150c5d88688f997f8456b1d18f806b4ede

    • SHA512

      7b5c470bdf915487c480b4f713e8d5d505d2464f4170f271a70c766ed3b7c21124445a7c76acf651519c428ad319c0d634ade7b0bbbb7a769598ce0c8b110066

    • SSDEEP

      24576:GImw98okVgela0as5CqLVO7XJCjkD3N0HRAiy:4L5ljasaU

    • Avoslocker Ransomware

      Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

    • Avoslocker family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (1451) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks