General
-
Target
3a54bc3a76331908e701b977a1eed6eb
-
Size
112KB
-
Sample
240918-kbnjeasalr
-
MD5
3a54bc3a76331908e701b977a1eed6eb
-
SHA1
c48940b4eb92c7391fe3091ca4cca300b09117fb
-
SHA256
c95ab5b6008be69eeb3f8022d8ce6934a7676ff4535a27b7f1be890c25868145
-
SHA512
23fbac1e21648722d963348303491bce8ca12623c6aacf25ce0de4d5b8ec07b09ca58701ed53f1a5d267c8eb133c95e37feb05d30320aca456c92034c0e2a3fb
-
SSDEEP
3072:ll4DEGYx6KAMrHTx4rd60njnXN+KUpVkJB3rxyM/mhSd:ll4DElxgf6WjsKbehe
Static task
static1
Behavioral task
behavioral1
Sample
3a54bc3a76331908e701b977a1eed6eb.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
3a54bc3a76331908e701b977a1eed6eb
-
Size
112KB
-
MD5
3a54bc3a76331908e701b977a1eed6eb
-
SHA1
c48940b4eb92c7391fe3091ca4cca300b09117fb
-
SHA256
c95ab5b6008be69eeb3f8022d8ce6934a7676ff4535a27b7f1be890c25868145
-
SHA512
23fbac1e21648722d963348303491bce8ca12623c6aacf25ce0de4d5b8ec07b09ca58701ed53f1a5d267c8eb133c95e37feb05d30320aca456c92034c0e2a3fb
-
SSDEEP
3072:ll4DEGYx6KAMrHTx4rd60njnXN+KUpVkJB3rxyM/mhSd:ll4DElxgf6WjsKbehe
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-