General
-
Target
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
-
Size
182KB
-
Sample
231018-m5j47adf5z
-
MD5
efabd324c3f8a6a7ec1fa843e92f71e9
-
SHA1
0ae13cab4139a56708f48830f18c2ff1d763efda
-
SHA256
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8
-
SHA512
116c16441d0815c1e111590d6a816a502836d356ad41b115688fca482c451c4c4373cde1e3c6ed713343a042b23b9e6bf69fbc634258f5ed2f16ed6958e710ce
-
SSDEEP
3072:tuTO4rRZirgvXwmGyuXscjWEGYx6KAMLq+ZDPUEMTlqJKaHgazSQfOjb:tkZcgvgmGyGwElxgOZDPFMTeKIwjb
Static task
static1
Behavioral task
behavioral1
Sample
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\Program Files\7-Zip\RESTORE_FILES.txt
azov
Targets
-
-
Target
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
-
Size
182KB
-
MD5
efabd324c3f8a6a7ec1fa843e92f71e9
-
SHA1
0ae13cab4139a56708f48830f18c2ff1d763efda
-
SHA256
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8
-
SHA512
116c16441d0815c1e111590d6a816a502836d356ad41b115688fca482c451c4c4373cde1e3c6ed713343a042b23b9e6bf69fbc634258f5ed2f16ed6958e710ce
-
SSDEEP
3072:tuTO4rRZirgvXwmGyuXscjWEGYx6KAMLq+ZDPUEMTlqJKaHgazSQfOjb:tkZcgvgmGyGwElxgOZDPFMTeKIwjb
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-