General
-
Target
377c85975821467d2bcf139290e62540
-
Size
100KB
-
Sample
240918-cj9slsxerk
-
MD5
377c85975821467d2bcf139290e62540
-
SHA1
a7010b442b380f249b303845d0a4c12e1cdb66d9
-
SHA256
53f2c1f436a0f549d33a7e3110d87c905501a33dc1762abf3f4560acbf8ddf7e
-
SHA512
bd33bcbd05b3a471122964da6bd1f752787645543cfd1835de0bd6075372153b078a8570012605fa5bf4568a1a7c98beaa3c8b268853f629b54f4322b0971cd4
-
SSDEEP
3072:s0ZwEGYx6KAMHcETx4rY6q47I0+9QMViJ:s0ZwElxgu6t7IGJ
Static task
static1
Behavioral task
behavioral1
Sample
377c85975821467d2bcf139290e62540.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
377c85975821467d2bcf139290e62540
-
Size
100KB
-
MD5
377c85975821467d2bcf139290e62540
-
SHA1
a7010b442b380f249b303845d0a4c12e1cdb66d9
-
SHA256
53f2c1f436a0f549d33a7e3110d87c905501a33dc1762abf3f4560acbf8ddf7e
-
SHA512
bd33bcbd05b3a471122964da6bd1f752787645543cfd1835de0bd6075372153b078a8570012605fa5bf4568a1a7c98beaa3c8b268853f629b54f4322b0971cd4
-
SSDEEP
3072:s0ZwEGYx6KAMHcETx4rY6q47I0+9QMViJ:s0ZwElxgu6t7IGJ
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-