


































Initial Access | T1190 Exploit public-facing application T1078 Valid accounts |
Execution | T1059 Command and scripting interpreter T1072 Software deployment tools |
Persistence | T1136 Create account T1547 Boot or logon autostart execution |
Defense Evasion | T1112 Modify registry T1562 Impair defenses T1140 Deobfuscate/Decode files or information T1070 Indicator removal on host |
Credential Access | T1003 OS credential dumping T1552 Unsecured credentials T1555 Credentials from password stores |
Discovery | T1083 File and directory discovery T1135 Network share discovery T1057 Process discovery T1018 Remote system discovery |
Lateral Movement | T1021 Remote services T1072 Software deployment tools |
Command and Control | T1219 Remote access software |
Impact | T1436 Data encrypted for impact T1489 Service stop T1490 Inhibit system recovery T1491 Defacement |
Key | Value |
Platform | WindowsLinuxEXSi |
Language | C++ |
Encrypting Algo’s | RSAAES-256(Toencryptfiles)ChaCha20Algofencry ptencrypteddata |
Mutex Name | ievah8eVki3Ho4oo |
API’s | WebshellMoveFileWRMStartSessionRmRegisterResourcesRmGetList(toaccessthefilesfencryption)WNetOpenEnumAWNetEnumResourceA WNetAddConnection2A(toenumerateencryptthenetwkresources) |
DLL’s | api-ms-win-ce-datetime-l1-1-1api-ms-win-ce-file-l1-2-2api-ms-win-ce-localization-l1-2-1api-ms-win-ce-localization-obsolete-l1-2-0api-ms-win-ce-processthreads-l1-1-2api-ms-win-ce-string-l1-1-0api-ms-win-ce-sysinfo-l1-2-1api-ms-win-ce-winrt-l1-1-0api-ms-win-ce-xstate-l2-1-0api-ms-win-security-systemfunctions-l1-1-0ext-ms-win-ntuser-dialogbox-l1-1-0ext-ms-win-ntuser-windowstation-l1-1-0api-ms-win-appmodel-runtime-l1-1-2 |
AvosLocker Using Tools to Access Device/Host | CobaltStrikeEncodedPowerShellscripts(publiclyavailabletool)PuTTYSecureCopyclienttool“pscp.exe”RcloneAnydeskScannerAdvancedIPscannerWinListerChiselPDQDeploy(PDQDeploytopushoutWindowsbatchscriptstomachinestheyplannedtotarget.) |
Affected File Extensions | ndoc, docx, xls, xlsx, ppt, pptx, pst, ost, msg, eml, vsd, vsdx, txt, csv, rtf, wks, wk1, pdf, dwg, onetoc2, snt, jpeg, jpg, docb, docm, dot, dotm, dotx, xlsm, xlsb, xlw, xlt, xlm, xlc, xltx, xltm, pptm, pot, pps, ppsm, ppsx, ppam, potx, potm, edb, hwp, 602, sxi, sti, sldx, sldm, sldm, vdi, vmdk, vmx, gpg, aes, ARC, PAQ, bz2, tbk, bak, tar, tgz, gz, 7z, rar, zip, backup, iso, vcd, bmp, png, gif, raw, cgm, tif, tiff, nef, psd, ai, svg, djvu, m4u, m3u, mid, wma, flv, 3g2, mkv, 3gp, mp4, mov, avi, asf, mpeg, vob, mpg, wmv, fla, swf, wav, mp3, sh, class, jar, java, rb, asp, php, jsp, brd, sch, dch, dip, pl, vb, vbs, ps1, bat, cmd, js, asm, h, pas, cpp, c, cs, suo, sln, ldf, mdf, ibd, myi, myd, frm, odb, dbf, db, mdb, accdb, sql, sqlitedb, sqlite3, asc, lay6, lay, mml, sxm, otg, odg, uop, std, sxd, otp, odp, wb2, slk, dif, stc, sxc, ots, ods, 3dm, max, 3ds, uot, stw, sxw, ott, odt, pem, p12, csr, crt, key, pfx, der, dat |
AvosLocker Encrypted Files Extension | .avos.avos2AvosLinux |
Batch Scripts of AvosLocker | execute.batLove.batUpdate.batlock.bat |
Virus Names to be Used by Avoslocker | Ransom:MSIL/ApisCrypt.PAA!MTBTrojan-Banker.Win32.NeutrinoPOS.bnqMSIL/Filecoder.NR |
Sites | |
Note File after Encryption | GET_YOUR_FILES_BACK.txt(windows)README_F_RESTE.txt(Linux) |
Hash 256 | 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 |
Hash SHA 1 | 05c63ce49129f768d31c4bdb62ef5fb53eb41b546f110f251860a7f6757853181417e19c28841eb49c8f5c136590a08a3103ba3e988073cfd5779519e8c26db068914df2083512ff8b24a2cc803ea498dab33aaf01322e88f79ffddcbc95d1ad9ad97374e60ef891027ac1dade9562f8b1de866186338da167f0c8d81aefcfc5943b31d695972194ac15e9f22f3273e5b6739b844fe33f7310476afb971956ddf6f94e2f49cd64a9590963ef3852e135e2b8deba |
Hash MD5 | e09183041930f37a38d0a776a63aa673d3cafcd46dea26c39dec17ca132e5138f659d1d15d2e0f3bd87379f8e88c6b42afed45cd85a191fe3b2543e3ae6aa81131f8eedc2d82f69ccc726e012416ce33a39b4bea47c4d123f8195a3ffb638a1b504bd1695de326bc533fde29b8a69319eb45ff7ea2ccdcceb2e7e14f9cc01397d285f1366d0d4fdae0b558db690497eacf0c2513b6e074267484d204a1653222 |
AvosLocker Service Name | Ransom.Win32.AVOSLOCKER.SMYXBLNTRansom.Win32.AVOSLOCKER.YPBLU |