General

  • Target

    test.exe

  • Size

    1.6MB

  • Sample

    241229-fsj54atlb1

  • MD5

    96323388726116da0c93a29df8dcc787

  • SHA1

    2692c6ed2d4d7b6c03fa4b044cae212dd86914ce

  • SHA256

    0f7435ed7290b7420751fcfa079c97ddd2901e79964e8f8f3760d31d8ed6b15a

  • SHA512

    7304c8868d397742970c06fe9967aabc173c12837478316436969e01b646da791cd51edb59db4e1b9e704beedb46035d67530127f05c0f9212a1d3b2f05e0274

  • SSDEEP

    24576:HImw98okVgela0as5CqLVO7XJCjkD3N0HRADV0aEhbHdn0TrldepPZ:hL5ljasaU4eaEhDF

Malware Config

Targets

    • Target

      test.exe

    • Size

      1.6MB

    • MD5

      96323388726116da0c93a29df8dcc787

    • SHA1

      2692c6ed2d4d7b6c03fa4b044cae212dd86914ce

    • SHA256

      0f7435ed7290b7420751fcfa079c97ddd2901e79964e8f8f3760d31d8ed6b15a

    • SHA512

      7304c8868d397742970c06fe9967aabc173c12837478316436969e01b646da791cd51edb59db4e1b9e704beedb46035d67530127f05c0f9212a1d3b2f05e0274

    • SSDEEP

      24576:HImw98okVgela0as5CqLVO7XJCjkD3N0HRADV0aEhbHdn0TrldepPZ:hL5ljasaU4eaEhDF

    • Avoslocker Ransomware

      Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

    • Avoslocker family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (10397) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks