General

  • Target

    b4611d6eef48a322ad0211fbd5d703c3e774a2d0833f8d22856d65fea8a4fa62

  • Size

    319KB

  • Sample

    240617-blz6hs1gmp

  • MD5

    2205e7cb7b20e45e49956a9ef1beda0c

  • SHA1

    5f7454d8aa563ae86550f9c1a954257df5f4fa73

  • SHA256

    b4611d6eef48a322ad0211fbd5d703c3e774a2d0833f8d22856d65fea8a4fa62

  • SHA512

    daeb410c7f3139b1a0fdcf38404e7238aafd3f45c92489f347879cc4b709b90e2808f7c0fa71fab6e324954d8f6bdcab31cf27ae8777ac1e3ca4f65efe74af8d

  • SSDEEP

    6144:eJUz5s90uqL6Zt0uLxhBv9TBA3QvEoInMsZ3x:e45s90uh3lnBv9TagvETr1x

Malware Config

Targets

    • Target

      b4611d6eef48a322ad0211fbd5d703c3e774a2d0833f8d22856d65fea8a4fa62

    • Size

      319KB

    • MD5

      2205e7cb7b20e45e49956a9ef1beda0c

    • SHA1

      5f7454d8aa563ae86550f9c1a954257df5f4fa73

    • SHA256

      b4611d6eef48a322ad0211fbd5d703c3e774a2d0833f8d22856d65fea8a4fa62

    • SHA512

      daeb410c7f3139b1a0fdcf38404e7238aafd3f45c92489f347879cc4b709b90e2808f7c0fa71fab6e324954d8f6bdcab31cf27ae8777ac1e3ca4f65efe74af8d

    • SSDEEP

      6144:eJUz5s90uqL6Zt0uLxhBv9TBA3QvEoInMsZ3x:e45s90uh3lnBv9TagvETr1x

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Renames multiple (331) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks