General
-
Target
6fa37b44b02c37654860a889b7357232
-
Size
218KB
-
Sample
240918-b4sjdswdmc
-
MD5
6fa37b44b02c37654860a889b7357232
-
SHA1
943840ce5e688886c93af9101c200a6aa20d165a
-
SHA256
98ea1bf06f53eba0ad356bd62c8a99351ccf3d86a0e9ec3c3a7fae603bf01a34
-
SHA512
f7a1386dc3c0cba6ab62e840f0f48ac5689aed70dcb49f12ac764cf3320aec57657325feb06d4cd00fd126cb932e53b729de49ba385cd33cd5aa18332e61d22a
-
SSDEEP
3072:BIXRFodXqsjH455EGYx6KAMlGMPyqVP8DRFcp3U/BqryhsKgNtGWIXhOFTTX:Bqg4bElxgjVqVPQFcW/sKsXN0W3Nr
Static task
static1
Behavioral task
behavioral1
Sample
6fa37b44b02c37654860a889b7357232.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6fa37b44b02c37654860a889b7357232.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
6fa37b44b02c37654860a889b7357232
-
Size
218KB
-
MD5
6fa37b44b02c37654860a889b7357232
-
SHA1
943840ce5e688886c93af9101c200a6aa20d165a
-
SHA256
98ea1bf06f53eba0ad356bd62c8a99351ccf3d86a0e9ec3c3a7fae603bf01a34
-
SHA512
f7a1386dc3c0cba6ab62e840f0f48ac5689aed70dcb49f12ac764cf3320aec57657325feb06d4cd00fd126cb932e53b729de49ba385cd33cd5aa18332e61d22a
-
SSDEEP
3072:BIXRFodXqsjH455EGYx6KAMlGMPyqVP8DRFcp3U/BqryhsKgNtGWIXhOFTTX:Bqg4bElxgjVqVPQFcW/sKsXN0W3Nr
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-