Ransomware Profile: avco3 – What You Need to Know Right Now
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: The strain appends
.avco3(exactly five lower-case characters – the digit is “3”, not “o”). -
Renaming Convention: Targets keep their original file names but receive a chained suffix:
OriginalFile.ext.id-XXXXXXXX.[[email protected]].avco3•
id-XXXXXXXXis a random 8-hex-digit victim identifier
• Email inside brackets is the negotiator mailbox. If the campaign runs with several affiliates at once, the bracketed alias varies (e.g.,[email protected]) but the outer.avco3extension remains constant.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First large-scale sightings occurred in late November 2023 when several MSPs and small healthcare providers in the U.S. and Germany reported over-night mass encryption. By early January 2024 it had become one of the top-five off-the-shelf payloads advertised on dark-web “Ransomware-as-a-Service (RaaS)” panels linked to Phobos/FAUST family infrastructures.
3. Primary Attack Vectors
- Propagation Mechanisms:
- RDP Brute Force & Stolen Credentials – Rather than spreading worms like Petya, avco3 teams prefer manual post-compromise scripts pushed via compromised Domain Admin accounts.
- Exploit Kits / Remote Code Execution – Windows-based Remote Monitoring & Management (RMM) tools lacking 2FA are a recurring entry: AnyDesk, ScreenConnect, Atera, and older versions of N-able SolarWinds RMM.
- Malicious Email Attachments – While not dominant, zipped .js dropper documents with LNK shortcuts have been seen.
-
System & Backup Attacks – Once inside, avco3 installs a service that:
• Disables Windows Defender viaSet-MpPreferencePowerShell calls
• Employsvssadmin delete shadows /all /quiet
• Useswevtutil cl Systemto clear logs for cover
Remediation & Recovery Strategies
1. Prevention
-
Immediate Controls
• Disable RDP exposure on TCP/3389 at the firewall; enforce VPN-only access.
• Enforce Mandatory 2FA for any remote-support tool (AnyDesk, ConnectWise, etc.).
• Apply Microsoft KB updates that patch common domain-escalation flaws: KB5027231 (April 2023), KB5026361 (May 2023) and KB5004442 (SMb server hardening).
• Deploy Application allow-listing (WDAC/AppLocker) blocking wscript.exe, cscript.exe, PowerShell.exe unless explicitly allowed.
• Segment backups completely: immutable S3-Object Lock, Veeam Hardened Repositories, or air-gapped tape.
2. Removal (Step-by-Step Disinfection)
- Isolate – Remove the infected machine from the network; power-off cloud replicas connected via site-to-site VPN.
- Boot into Windows Safe Mode with Networking (or WinRE if Safe Mode fails).
- Kill malicious services:
- Open “Task Manager ➞ Details,” locate any suspicious
svhostvr.exeor random-named *.exe under%APPDATA%\Microsoft\. End tasks.
- Delete persistence artifacts:
- Registry run keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ “V2st” - Scheduled tasks:
C:\Windows\System32\Tasks\Microsoft\Windows\PowerShell\ScheduledJobs\BrowserUpdate
-
Remove binaries:
– Look in%SystemDrive%\Users[username]\AppData\Local\Tempand%LOCALAPPDATA%\Temp\. - Manual AV/EDR scan: ESET Online Scanner, Malwarebytes (offline definition), or your standard EDR in “aggressive” mode.
- Restore user profiles / reinstall OS only if scans still flag kernel tampering.
3. File Decryption & Recovery
-
Recovery feasibility to date:
• No public decryptor exists for the hybrid ChaCha20 + RSA-2048 encryption scheme used by avco3’s fork of Phobos.
• Victims should avoid paying unless the legal/regulatory need for immediate uptime outweighs the likelihood of non-receipt of decryptor.
• Validated paths to recovery:- Verified offline backups with integrity-tested chain-of-custody.
-
Volume shadow copy remnants may survive if the ransomware service failed to run (check with
ShadowExplorerorvssadmin list shadows). -
Windows Previous Versions or restore points if the attacker focused only on %userprofile% paths.
• Tools for integrity verification:
– IREC (ImmuniSec Ransomware Entropy Checker) to locate clean vs encrypted files.
– Phobos Decryptor Comparer (proof-of-existence) – simply drops the ransom note (info.hta) to confirm the exact strain for insurance reporting.
4. Other Critical Information
-
Unique Characteristics
– Credential Dumper Suite: Along with avco3 DDoS (for noise), the payload drops Mimikatz fork, ProcDump for LSASS dump, and rclone.exe for mass exfiltration to Mega.io, making a double extortion playbook likely.
– Chain-of-Trust Bypass: avco3 whitelists itself inside Windows Defender SmartScreen using an injected fake Microsoft certificate; many endpoint telemetry products will show a “Signed, Trusted” status until definition DB 1.397.172 (released 08-Jan-2024) is applied.
– Lock-screen drop for embedded money counter: If the workstation has an NFC reader (e.g., hospital bedside terminals), it briefly locks the screen with a payment QR code directing users to scan their phone wallet—first observed in medical devices. -
Wider Impact & Notable Cases
– In December 2023 a 72-bed critical-access hospital in Pennsylvania paid USD 450 k after catastrophic EHR paralysis; an MSSP later found 15 TB of PII exfiltrated.
– Brazilian law firm Nascimento & Amaral became public breach #4 after Twitter researchers spotted credentials for their SharePoint from avco3 operators’ Telegram channel (“#Dumps24h”).
– The cyber-insurance arm of Hiscox added avco3 to high-risk MRSP effective 1 Feb 2024, increasing renewal premiums by 22 %.
Stay vigilant, patch aggressively, keep reliable offline backups, and engage law enforcement before paying any ransom.