Avaddon is a ransomware variant first detected in February 2019, used in cybercriminal campaigns targeting multiple sectors and organisations around the world, including Australia. Avaddon is offered as a Ransomware-as-a-Service (RaaS), enabling affiliates to utilise it as desired, provided they return a percentage of profits to Avaddon developers as commission. The ACSC is aware of several instances where the Avaddon ransomware has directly impacted organisations within Australia.
Avaddon has an active presence on underground dark web cybercrime forums, notably advertising the Avaddon RaaS variant to potential affiliates via a number of high tier cybercrime forums. Avaddon threat actors also utilise the data leak site (DLS) avaddongun7rngel[.]onion
to identify victims who fail or refuse to pay ransom demands.
Avaddon threat actors demand ransom payment via Bitcoin (BTC), with an average demand of BTC 0.73 (approximately USD $40,000) with the lure of a decryption tool offered (‘Avaddon General Decryptor’) if payment is made.
The ACSC is aware of active targeting of the following countries and sectors:
Targeted Countries | Targeted Sectors | ||
---|---|---|---|
Australia | Belgium | Academia | Airlines |
Brazil | Canada | Construction | Energy |
China | Costa Rica | Equipment | Financial |
Czech Republic | France | Freight and Transport | Government |
Germany | India | Health | Hospitality |
Indonesia | Italy | Information Technology | Law Enforcement |
Jordan | Peru | Manufacturing | Marketing |
Poland | Portugal | Retail | Pharmaceutical |
Spain | United Arab Emirates | Virtual Environment | |
United Kingdom | United States |
Identified Techniques, Tools and Procedures (TTPs) for Avaddon threat actors include:
avaddongun7rngel[.]onion
The Avaddon ransomware has the following capabilities:
Allocates memory | Anti-VM capabilities | Anti-debug capabilities | Bypass Windows |
---|---|---|---|
Calculates FNV hashes | Capture FNV hashes | Capture Network Share information | Capture disk information |
Capture hostname | Capture keyboard layout | Capture network configuration | Capture network interfaces |
Capture operating system information | Capture payment card data | Capture system network information | Communicates using ICMP |
Communicates using UDP | Communicates using raw sockets | Constructs mutex | Copy files |
Create Windows registry key | Create Windows registry key value | Create files | Create thread |
Creates processes | Decodes Base64 | Delete Volume Shadow Copy files | Delete a service |
Delete files | Encodes using Base64 | Encodes using XOR | Executes using a scheduled task |
Find files | Gets common file path | Gets environmental variable value | Gets file attribute |
HTTP request capabilities | HTTP response capabilities | List file sizes | List files |
Lists drives | Lists processes | Locks mutex | Move files |
Open Windows registry key | Overwrite or wipe file data by emptying the Recycling bin quietly | Persistence via Windows registry Run key | Query service information |
Read files | Reads memory | Receive data | Resolved Windows program files directory |
Send data | Sets Wallpaper | Sets environmental variable | Sets file attribute |
Start a service | Stop a service | Terminates processes | Uses AES |
Uses AES256 | Uses RC4 | Uses RSA | Writes memory |
Technique ID | Name | Technique ID | Name |
---|---|---|---|
T1027 | Obfuscated Files or Information | T147.001 | Virtualisation/Sandbox Evasion / System Checks |
T1202 | Indirect Command Execution | T1078 | Valid Accounts |
T1562.001 | Impair Defences: Disable or Modify Tools | T1070.004 | Indicator Removal on Host/ File Deletion |
T1486 | Data Encrypted for Impact | T12082 | System Information Discovery |
T1120 | Peripheral Device Discovery | T1490 | Inhibit System Recovery |
T1566 | Phishing | T1498.001 | Network Denial of Service / Direct Network Flood |
The ACSC has published several products which can assist organisations in reducing the risk and impact of ransomware. These products can be found on the ACSC website.
The ACSC also recommends the following be implemented:
SNORT Alert
Snort IDS: 2007837 ET TROJAN Suspicious User-Agent - Possible Trojan Downloader (WinInet)
YARA Rules
TLP:WHITE] win_avaddon_w0 (20200902 | Detects Avaddon ransomware)
rule win_avaddon_w0 {
meta:
description = "Detects Avaddon ransomware"
author = "@VK_Intel, modified by @r0ny_123"
reference = "https://twitter.com/VK_Intel/status/1300944441390370819"
tlp = "white"
date = "2020-09-01"
malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.avaddon"
malpedia_rule_date = "20200902"
malpedia_hash = ""
malpedia_version = "20200902"
malpedia_license = "CC BY-SA 4.0"
malpedia_sharing = "TLP:WHITE"
strings:
$str0 = "rcid"
$str1 = "hdd"
$str2 = "lang"
$cfg_parser = { 55 8b ec 6a ff 68 74 d8 46 00 64 ?? ?? ?? ?? ?? 50 81 ec 3c 02 00 00 a1 ?? ?? ?? ?? 33 c5 89 ?? ?? 56 57 50 8d ?? ?? 64 ?? ?? ?? ?? ?? 8b f1 89 ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c6 ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? 8d ?? ?? ?? ?? ?? 8b ?? 51 8b ce ff ?? ?? 83 ?? ?? ?? ?? ?? ?? 0f ?? ?? ?? ?? ?? 8d ?? ?? ?? ?? ?? 8d ?? ?? e8 ?? ?? ?? ?? c6 ?? ?? ?? 8b ?? ?? 85 c0 0f ?? ?? ?? ?? ?? b9 10 00 00 00 c7 ?? ?? ?? ?? ?? ?? 3b c1 c7 ?? ?? ?? ?? ?? ?? c6 ?? ?? ?? 0f 42 c8 83 ?? ?? ?? 8d ?? ?? 0f ?? ?? ?? 51 50 8d ?? ?? e8 ?? ?? ?? ?? c6 ?? ?? ?? 8b ?? ?? c7 ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? c6 ?? ?? ?? 83 f8 10 0f ?? ?? ?? ?? ?? 83 c0 f0 b9 20 00 00 00 3b c1 0f 42 c8 83 ?? ?? ?? 8d ?? ?? 0f ?? ?? ?? 51 83 c0 10 8d ?? ?? 50 e8 ?? ?? ?? ?? c6 ?? ?? ?? 83 ?? ?? ?? 0f ?? ?? ?? ?? ?? 83 ?? ?? ?? 0f ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c6 ?? ?? ?? 8d ?? ?? ?? ?? ?? 8b ?? 51 8b ce ff ?? ?? 8b ?? ?? ?? ?? ?? 8d ?? ?? ?? ?? ?? e8 ?? ?? ?? ?? 0f ?? ?? ?? ?? ?? ?? 0f ?? ?? ?? ?? ?? ?? f3 ?? ?? ?? ?? ?? ?? ?? 66 ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ?? c7 ?? ?? ?? ?? ?? ?? ?? ?? ??}
$crypt_imp_seq_0 = { 83 ?? ?? ?? 8b c7 c7 ?? ?? ?? ?? ?? ?? 72 ?? 8b ?? 6a 00 6a 00 8d ?? ?? 51 6a 00 6a 01 6a 00 50 ff ?? ?? ?? ?? ?? 85 c0 [3-6] 8b ?? ?? ff ?? ?? ?? ?? ?? 56 6a 00 50 ff ?? ?? ?? ?? ?? 8b f0 85 f6 [2-6] 83 ?? ?? ?? 72 ?? 8b ?? 6a 00 6a 00 8d ?? ?? 50 56 6a 01 6a 00 57 ff ?? ?? ?? ?? ?? 85 c0 74 ?? [0-3] 8d ?? ?? 50 6a 00 6a 00 ff ?? ?? 56 ff ?? ?? ff ?? ?? ?? ?? ?? }
condition:
uint16(0) == 0x5a4d and 1 of ($str*) and ($cfg_parser or $crypt_imp_seq_0)
SHA256 Hashes
Hash Type | Hash |
---|---|
SHA256 |
0a052eff71641ff91897af5bdecb4a98ed3cb32bcb6ff86c4396b1e3ceee0184 |
SHA256 |
0ff4058f709d278ed662719b9627618c48e7a656c59f6bfecda9081c7cbd742b |
SHA256 |
146e554f0d56db9a88224cd6921744fdfe1f8ee4a9e3ac79711f9ab15f9d3c7f |
SHA256 |
165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8 |
SHA256 |
28adb5fa487a7d726b8bad629736641aadbdacca5e4f417acc791d0e853924a7 |
SHA256 |
2946ef53c8fec94dcdf9d3a1afc077ee9a3869eacb0879cb082ee0ce3de6a2e7 |
SHA256 |
29b5a12cda22a30533e22620ae89c4a36c9235714f4bad2e3944c38acb3c5eee |
SHA256 |
331177ca9c2bf0c6ac4acd5d2d40c77991bb5edb6e546913528b1665d8b501f3 |
SHA256 |
46a8c1e768f632d69d06bfbd93932d102965c9e3f7c37d4a92e30aaeca905675 |
SHA256 |
5252cc9dd3a35f392cc50b298de47838298128f4a1924f9eb0756039ce1e4fa2 |
SHA256 |
61126de1b795b976f3ac878f48e88fa77a87d7308ba57c7642b9e1068403a496 |
Your blog post content here…