General
-
Target
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.7z
-
Size
2.2MB
-
Sample
250402-tmvxassmy5
-
MD5
02ab46ad0f72ebf04bfc987b1c6cfd93
-
SHA1
1d319b9ecda6f4860bca276e00ed33c1e572f151
-
SHA256
1640dbb1202916848fa226c543ee4abf6a3c24f357548f4cfcb41319b153803e
-
SHA512
0949a55aca5d9d39061b219eb8e863e7c99abdc822747072d8b55d1ad9a3570f69419bde0bb957d414af1ff462fc6853b78a684f8fe2aa4eb142ffc27b5f5cbb
-
SSDEEP
49152:VS4oWqzZEwotFlMO+feUOqW2MjUp7d6wCuxfQzT:lBqzZEwoXli2z296
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.7z
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.7z
-
Size
2.2MB
-
MD5
02ab46ad0f72ebf04bfc987b1c6cfd93
-
SHA1
1d319b9ecda6f4860bca276e00ed33c1e572f151
-
SHA256
1640dbb1202916848fa226c543ee4abf6a3c24f357548f4cfcb41319b153803e
-
SHA512
0949a55aca5d9d39061b219eb8e863e7c99abdc822747072d8b55d1ad9a3570f69419bde0bb957d414af1ff462fc6853b78a684f8fe2aa4eb142ffc27b5f5cbb
-
SSDEEP
49152:VS4oWqzZEwotFlMO+feUOqW2MjUp7d6wCuxfQzT:lBqzZEwoXli2z296
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon family
-
Avaddon payload
-
UAC bypass
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (149) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1