One Source to Rule Them All: Chasing AVADDON Ransomware | Mandiant By Mandiant Published: 2022-01-19 · Archived: 2026-04-05 14:21:03 UTC AVADDON operates similarly to other ransomware samples and contains an embedded configuration. AVADDON’s configuration is stored in the form of global stdstring variables that are initialized prior to main as a C++ global initializer. The strings are decoded as they are needed during execution. All configuration encoding is performed using Base64 and multiple iterations of arithmetic operations utilizing a hardcoded single-byte key that varies per binary. Figure 7 is an example python script used for decoding configuration data found in sample hash (MD5:ae663fa3b803d8c23e98373fa3f66d21). AVADDON’s execution flow begins by stopping and deleting services and processes that might interrupt its operation (Figure 8). Next, the configuration runs multiple commands that prevent a user from restoring from backup (Table 1). Finally, the ransomware begins its encryption operation by recursively iterating local drives and network shares while avoiding directories (Figure 9) and files with specific extensions (Figure 10). AVADDON searches the following strings related to virtual machines, backups and antivirus services to stop and delete them: The following processes are stopped. The ransomware stores a short-hand form of the full process name, but it does not appear to be used during process identification or termination. AVADDON deletes the Windows shadow volumes and empties the recycle bin to avoid file recovery. Next, it executes the anti-recovery commands in Figure 9. Finally, to prevent the system from restarting, AVADDON leverages the Windows Restart Manager by adding files actively being encrypted to the Restart Manager registry. The following directories are excluded from the encryption process and are consistent across different versions of AVADDON. Additionally, directories containing the following keywords are excluded. When encrypting the filesystem, the following extensions are excluded to ensure the system can be recovered after paying the ransom with the provided decryptor. The ransomware includes a host survey as part of the ransom note. The host survey is comprised of two parts that are separated by a hyphen character and then Base64 encoded. The first part is a plaintext victim id, the second part is an RSA encrypted JSON structure of data containing the fields in Figure 13. Structure Description ext Encrypted file extension rcid AES key and file extension encrypted with RSA key and stored in hex format hdd Detected and connected drives to the host hdd.name Drive letter A-Z hdd.size Drive size in GB hdd.type Drive type local/network https://www.mandiant.com/resources/chasing-avaddon-ransomware Page 1 of 9 lang Default locale language name Hostname