General
-
Target
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b.exe
-
Size
182KB
-
Sample
221113-symvdseg31
-
MD5
f2a75b25f7e0cfee3fa861754d01bee2
-
SHA1
107692789d688eede43064c44b6a07958cbc3edd
-
SHA256
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b
-
SHA512
a73edf7978ab64a97bb79a77942276eb4357c59f976dda066a5682d1241b8caaf1a3fe104f6f9d7e48d7e9866d62facb4ac7c7f6d844da90c79cd064ce5582c2
-
SSDEEP
3072:tuTO4rRZiWfvX5mG8bXscjTEGYx6KAMXq+ZDPUEMTlqFdcewoGn5loiRgLAG:tkZRfvJmG8jpElxg+ZDPFMTUcewX5l92
Static task
static1
Behavioral task
behavioral1
Sample
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\RESTORE_FILES.txt
azov
Targets
-
-
Target
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b.exe
-
Size
182KB
-
MD5
f2a75b25f7e0cfee3fa861754d01bee2
-
SHA1
107692789d688eede43064c44b6a07958cbc3edd
-
SHA256
a7aed9c1c1457819089845f21f73c66e8a35528ccc9e0fe71dfc10e90110705b
-
SHA512
a73edf7978ab64a97bb79a77942276eb4357c59f976dda066a5682d1241b8caaf1a3fe104f6f9d7e48d7e9866d62facb4ac7c7f6d844da90c79cd064ce5582c2
-
SSDEEP
3072:tuTO4rRZiWfvX5mG8bXscjTEGYx6KAMXq+ZDPUEMTlqFdcewoGn5loiRgLAG:tkZRfvJmG8jpElxg+ZDPFMTUcewX5l92
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-