# Copyright (c) 2014-2025 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://blog.malwarebytes.com/threat-intelligence/2021/07/avoslocker-enters-the-ransomware-scene-asks-for-partners/

avos2fuj6olp6x36.onion

# Reference: https://twitter.com/petrovic082/status/1424397157495459847
# Reference: https://app.any.run/tasks/0c680b41-c6e9-4129-ade3-2bd630f739d5/
# Reference: https://github.com/thetanz/ransomwatch/blob/main/docs/INDEX.md

avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion

# Reference: https://twitter.com/cyberthreat2/status/1482163704267358208
# Reference: https://www.virustotal.com/gui/file/0cd7b6ea8857ce827180342a1c955e79c3336a6cf2000244e5cfd4279c5fc1b6/detection

193.32.23.62:8081

# Reference: https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html

45.136.230.191:4000
/D234R23

# Reference: https://www.zscaler.com/blogs/security-research/retrospective-avoslocker
# Reference: https://otx.alienvault.com/pulse/653fe1c4fb7a9be286796dd2

avos53nnmi4u6amh.onion
