General
-
Target
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391
-
Size
1.5MB
-
Sample
240915-t2tmsatcml
-
MD5
21641adc924ac0dab813848c457ba37c
-
SHA1
d490da9069955c01395e97c7e75cf67274978cdf
-
SHA256
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391
-
SHA512
707be2644841efe6e7c5f1f66f8385d6f4b59ec0ef704e1cbd5db979b3cd300696e70a45907e6246dce17eb70cef5ec05edaaf729041369789f9fa2751bb4b50
-
SSDEEP
24576:HkVUWcG3lqC2MERKvARjLbDoZJoAOM08/85RkptVIJqFx3r:qCC2DReUOOMjUfkptVxFJ
Static task
static1
Behavioral task
behavioral1
Sample
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391
-
Size
1.5MB
-
MD5
21641adc924ac0dab813848c457ba37c
-
SHA1
d490da9069955c01395e97c7e75cf67274978cdf
-
SHA256
e062eef39560092cdd4fb500542d09f945f7446f3d7bdaf08150ae5d5a14d391
-
SHA512
707be2644841efe6e7c5f1f66f8385d6f4b59ec0ef704e1cbd5db979b3cd300696e70a45907e6246dce17eb70cef5ec05edaaf729041369789f9fa2751bb4b50
-
SSDEEP
24576:HkVUWcG3lqC2MERKvARjLbDoZJoAOM08/85RkptVIJqFx3r:qCC2DReUOOMjUfkptVxFJ
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-