Go to Source October 13, 2023
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) to disseminate known IOCs, TTPs, and detection methods associated with the AvosLocker variant identified through FBI investigations as recently as May 2023. AvosLocker operates under a ransomware-as-a-service (RaaS) model. AvosLocker affiliates have compromised organizations across multiple critical infrastructure sectors in the United States, affecting Windows, Linux, and VMware ESXi environments. AvosLocker affiliates compromise organizations’ networks by using legitimate software and open-source remote system administration tools. AvosLocker affiliates then use exfiltration-based data extortion tactics with threats of leaking and/or publishing stolen data.
This joint CSA updates the March 17, 2022, AvosLocker ransomware joint CSA, Indicators of Compromise Associated with AvosLocker ransomware, released by FBI and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN). This update includes IOCs and TTPs not included in the previous advisory and a YARA rule FBI developed after analyzing a tool associated with an AvosLocker compromise.
FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of AvosLocker ransomware and other ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
AvosLocker affiliates use legitimate software and open-source tools during ransomware operations, which include exfiltration-based data extortion. Specifically, affiliates use:
FBI has also observed AvosLocker affiliates:
.bat
) scripts [T1059.003] for lateral movement, privilege escalation, and disabling antivirus software.For additional TTPs, see joint CSA Indicators of Compromise Associated with AvosLocker Ransomware.
See Tables 1 and 2 below for IOCs obtained from January 2023–May 2023.
Files and Tools |
MD5 |
psscriptpolicytest_im2hdxqi.g0k.ps1 |
829f2233a1cd77e9ec7de98596cd8165 |
psscriptpolicytest_lysyd03n.o10.ps1 |
6ebd7d7473f0ace3f52c483389cab93f |
psscriptpolicytest_1bokrh3l.2nw.ps1 |
10ef090d2f4c8001faadb0a833d60089 |
psscriptpolicytest_nvuxllhd.fs4.ps1 |
8227af68552198a2d42de51cded2ce60 |
psscriptpolicytest_2by2p21u.4ej.ps1 |
9d0b3796d1d174080cdfdbd4064bea3a |
psscriptpolicytest_te5sbsfv.new.ps1 |
af31b5a572b3208f81dbf42f6c143f99 |
psscriptpolicytest_v3etgbxw.bmm.ps1 |
1892bd45671f17e9f7f63d3ed15e348e |
psscriptpolicytest_fqa24ixq.dtc.ps1 |
cc68eaf36cb90c08308ad0ca3abc17c1 |
psscriptpolicytest_jzjombgn.sol.ps1 |
646dc0b7335cffb671ae3dfd1ebefe47 |
psscriptpolicytest_rdm5qyy1.phg.ps1 |
609a925fd253e82c80262bad31637f19 |
psscriptpolicytest_endvm2zz.qlp.ps1 |
c6a667619fff6cf44f447868d8edd681 |
psscriptpolicytest_s1mgcgdk.25n.ps1 |
3222c60b10e5a7c3158fd1cb3f513640 |
psscriptpolicytest_xnjvzu5o.fta.ps1 |
90ce10d9aca909a8d2524bc265ef2fa4 |
psscriptpolicytest_satzbifj.oli.ps1 |
44a3561fb9e877a2841de36a3698abc0 |
psscriptpolicytest_grjck50v.nyg.ps1 |
5cb3f10db11e1795c49ec6273c52b5f1 |
psscriptpolicytest_0bybivfe.x1t.ps1 |
122ea6581a36f14ab5ab65475370107e |
psscriptpolicytest_bzoicrns.kat.ps1 |
c82d7be7afdc9f3a0e474f019fb7b0f7 |
Files and Tools |
SHA256 |
BEACON.PS1 |
e68f9c3314beee640cc32f08a8532aa8dcda613543c54a83680c21d7cd49ca0f |
Encoded PowerShell script |
ad5fd10aa2dc82731f3885553763dfd4548651ef3e28c69f77ad035166d63db7 |
Encoded PowerShell script |
48dd7d519dbb67b7a2bb2747729fc46e5832c30cafe15f76c1dbe3a249e5e731 |
Files and Tools |
SHA1 |
PowerShell backdoor |
2d1ce0231cf8ff967c36bbfc931f3807ddba765c |
Email Address |
---|
keishagrey994@outlook[.]com |
Virtual Currency Wallets |
a6dedd35ad745641c52d6a9f8da1fb09101d152f01b4b0e85a64d21c2a0845ee |
bfacebcafff00b94ad2bff96b718a416c353a4ae223aa47d4202cdbc31e09c92 |
418748c1862627cf91e829c64df9440d19f67f8a7628471d4b3a6cc5696944dd |
bc1qn0u8un00nl6uz6uqrw7p50rg86gjrx492jkwfn |
Based on an investigation by an advanced digital forensics group, FBI created the following YARA rule to detect the signature for a file identified as enabling malware. NetMonitor.exe
is a malware masquerading as a legitimate process and has the appearance of a legitimate network monitoring tool. This persistence tool sends pings from the network every five minutes. The NetMonitor executable is configured to use an IP address as its command server, and the program communicates with the server over port 443. During the attack, traffic between NetMonitor and the command server is encrypted, where NetMonitor functions like a reverse proxy and allows actors to connect to the tool from outside the victim’s network.
rule NetMonitor |
See Tables 3-7 for all referenced threat actor tactics and techniques in this advisory.
Initial Access |
||
---|---|---|
Technique Title |
ID |
Use |
External Remote Services |
AvosLocker affiliates use remote system administration tools—Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, and Atera Agent—to access backdoor access vectors. |
Execution | ||
---|---|---|
Technique Title |
ID |
Use |
Command and Scripting Interpreter: PowerShell |
AvosLocker affiliates use custom PowerShell scripts to enable privilege escalation, lateral movement, and to disable antivirus. |
|
Command and Scripting Interpreter: Windows Command Shell |
AvosLocker affiliates use custom |
|
Windows Management Instrumentation |
AvosLocker affiliates use legitimate Windows tools, such as PsExec and Nltest in their execution. |
Persistence |
||
---|---|---|
Technique Title |
ID |
Use |
Server Software Component |
AvosLocker affiliates have uploaded and used custom webshells to enable network access. |
Credential Access |
||
---|---|---|
Technique Title |
ID |
Use |
Credentials from Password Stores |
AvosLocker affiliates use open-source applications Lazagne and Mimikatz to steal credentials from system stores. |
Command and Control |
||
---|---|---|
Technique Title |
ID |
Use |
Protocol Tunneling |
AvosLocker affiliates use open source networking tunneling tools like Ligolo and Chisel. |
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
FBI and CISA recommend organizations implement the mitigations below to improve your cybersecurity posture on the basis of the threat actor activity and to reduce the risk of compromise by AvosLocker ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
Configure the Windows Registry to require User Account Control (UAC) approval for any PsExec operations requiring administrator privileges to reduce the risk of lateral movement by PsExec.
In addition, FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI and CISA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with AvosLocker affiliates, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center at [email protected] or (888) 282-0870.
The information in this report is being provided “as is” for informational purposes only. CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.
[1] GitHub sysdream | ligolo repository
[2] GitHub jpillora | chisel repository
[3] GitHub BishopFox | sliver repository
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |