General

  • Target

    c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe

  • Size

    182KB

  • Sample

    230704-phq1bscf47

  • MD5

    17db54b724866a8c9a5abb84d023c247

  • SHA1

    a1bae693925a9bab2c642bb1bc560f7efa9e4225

  • SHA256

    c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6

  • SHA512

    9900b6e487873fab3054f763cc597b49f497083fcdfd01c7e05a2f36497e11ac31057e1d365d2304a09987db0ef2d8f6bfd1b4ca56aa992d0ebe5dc0d9cc1dce

  • SSDEEP

    3072:3TO4rVlSkm5XMLWKMdZEU39gGioLdmQp3HODe0emkcxMWnThZAs:dlPqXUWv3Es9VhmQp+6GBdZT

Malware Config

Targets

    • Target

      c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe

    • Size

      182KB

    • MD5

      17db54b724866a8c9a5abb84d023c247

    • SHA1

      a1bae693925a9bab2c642bb1bc560f7efa9e4225

    • SHA256

      c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6

    • SHA512

      9900b6e487873fab3054f763cc597b49f497083fcdfd01c7e05a2f36497e11ac31057e1d365d2304a09987db0ef2d8f6bfd1b4ca56aa992d0ebe5dc0d9cc1dce

    • SSDEEP

      3072:3TO4rVlSkm5XMLWKMdZEU39gGioLdmQp3HODe0emkcxMWnThZAs:dlPqXUWv3Es9VhmQp+6GBdZT

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Renames multiple (138) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (174) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks