MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Avaddon


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
SHA3-384 hash: 6cd145630a0a078cdf6ec895a7d93610e8950f1666da88d2bfbb7fcb6347b68219294650b63ae67859539b92ce2c4d95
SHA1 hash: 51d85210c2f621ca14d92a8375ee24d62f9d7f44
MD5 hash: 275e4a63fc63c995b3e0d464919f211b
humanhash: stream-four-failed-eighteen
File name:Avaddon Ransomware
Download: download sample
Signature Avaddon
File size:736'608 bytes
First seen:2020-09-01 13:27:29 UTC
Last seen:2020-09-01 14:54:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ebcba21b169b4d31880471f7ee399c34 (1 x Avaddon)
ssdeep 12288:OR8hjUV679Aa4Auw3gveB17cOT1WHWEQTe0udkuHgCNU7SY/qgjjmJ/:quK679Aa4Auw3gveB1TGWEQSzXY/tjq/
Threatray 12 similar samples on MalwareBazaar
TLSH 5CF49E317D82C077E46A41304E98A7B594BEF8724B320DDB67C86B1D5E706E26E31A73
Reporter JAMESWT_WT
Tags:Avaddon Gold Stroy SP Z O O

Code Signing Certificate

Organisation:DigiCert High Assurance EV Root CA
Issuer:DigiCert High Assurance EV Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 10 00:00:00 2006 GMT
Valid to:Nov 10 00:00:00 2031 GMT
Serial number: 02AC5C266A0B409B8F0B79F2AE462577
Intelligence: 204 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Launching a service
Creating a file
Enabling the 'hidden' option for recently created files
Changing a file
Connection attempt
Reading critical registry keys
Network activity
Blocking the User Account Control
Deleting volume shadow copies
Creating a file in the mass storage device
Stealing user critical data
Encrypting user's files
Result
Threat name:
Avaddon
Detection:
malicious
Classification:
rans.spre
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Deletes shadow drive data (may be related to ransomware)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Spreads via windows shares (copies files to share folders)
Writes many files with high entropy
Yara detected Avaddon Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 280693 Sample: Avaddon Ransomware Startdate: 01/09/2020 Architecture: WINDOWS Score: 80 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Avaddon Ransomware 2->43 45 2 other signatures 2->45 7 Avaddon Ransomware.exe 502 65 2->7         started        process3 file4 31 C:\Users\user\Desktop\...\MQAWXUYAIK.docx, data 7->31 dropped 33 C:\Users\user\Desktop\MQAWXUYAIK.xlsx, data 7->33 dropped 35 C:\Users\user\Desktop\MNULNCRIYC.pdf, data 7->35 dropped 37 93 other malicious files 7->37 dropped 47 Deletes shadow drive data (may be related to ransomware) 7->47 49 Spreads via windows shares (copies files to share folders) 7->49 51 Modifies existing user documents (likely ransomware behavior) 7->51 11 WMIC.exe 1 7->11         started        13 WMIC.exe 1 7->13         started        15 WMIC.exe 1 7->15         started        17 3 other processes 7->17 signatures5 process6 process7 19 conhost.exe 11->19         started        21 conhost.exe 13->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        27 conhost.exe 17->27         started        29 conhost.exe 17->29         started       
Threat name:
Win32.Ransomware.Avaddon
Status:
Malicious
First seen:
2020-08-31 17:33:46 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware evasion trojan persistence
Behaviour
Interacts with shadow copies
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Interacts with shadow copies
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Drops file in Windows directory
Modifies service
Modifies service
Checks whether UAC is enabled
Drops desktop.ini file(s)
Enumerates connected drives
Checks whether UAC is enabled
Drops desktop.ini file(s)
Enumerates connected drives
Modifies extensions of user files
Modifies extensions of user files
Deletes shadow copies
Deletes shadow copies
UAC bypass
UAC bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments