General

  • Target

    b36c3052fc55acad501878f1047c5835ccd8aac0bf8514ffe6fcf2f85d8f6b66.exe

  • Size

    317KB

  • Sample

    221113-sy76bsbe66

  • MD5

    fb211c2ac0f37a104de1b4377e87982c

  • SHA1

    39fc0b935b35c6d2ffd5664467606765cb207c45

  • SHA256

    b36c3052fc55acad501878f1047c5835ccd8aac0bf8514ffe6fcf2f85d8f6b66

  • SHA512

    3703086c2daa63387f61f9c971d6356da17e9c0a4f54a32fbc112811ab28c36d814ec40443619e13225a18ed7749c293745ce12441328a51ad2a6fcf20b3ae66

  • SSDEEP

    6144:fkKWzs9VCmtL8kIKmHlFTda9TBOvIVcsY/ga2Wm:fCzs9VLtL8PFFRa9TovALY0Wm

Malware Config

Targets

    • Target

      b36c3052fc55acad501878f1047c5835ccd8aac0bf8514ffe6fcf2f85d8f6b66.exe

    • Size

      317KB

    • MD5

      fb211c2ac0f37a104de1b4377e87982c

    • SHA1

      39fc0b935b35c6d2ffd5664467606765cb207c45

    • SHA256

      b36c3052fc55acad501878f1047c5835ccd8aac0bf8514ffe6fcf2f85d8f6b66

    • SHA512

      3703086c2daa63387f61f9c971d6356da17e9c0a4f54a32fbc112811ab28c36d814ec40443619e13225a18ed7749c293745ce12441328a51ad2a6fcf20b3ae66

    • SSDEEP

      6144:fkKWzs9VCmtL8kIKmHlFTda9TBOvIVcsY/ga2Wm:fCzs9VLtL8PFFRa9TovALY0Wm

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks