# Copyright (c) 2014-2022 Maltrail developers (https://github.com/stamparm/maltrail/) # See the file 'LICENSE' for copying permission # Reference: https://blog.malwarebytes.com/threat-intelligence/2021/07/avoslocker-enters-the-ransomware-scene-asks-for-partners/ avos2fuj6olp6x36.onion # Reference: https://twitter.com/petrovic082/status/1424397157495459847 # Reference: https://app.any.run/tasks/0c680b41-c6e9-4129-ade3-2bd630f739d5/ # Reference: https://github.com/thetanz/ransomwatch/blob/main/docs/INDEX.md avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion # Reference: https://twitter.com/cyberthreat2/status/1482163704267358208 # Reference: https://www.virustotal.com/gui/file/0cd7b6ea8857ce827180342a1c955e79c3336a6cf2000244e5cfd4279c5fc1b6/detection 193.32.23.62:8081 # Reference: https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html 45.136.230.191:4000 /D234R23