General

  • Target

    3fa4a10d6132b2c7234726ce029c65ebdd605335bd29befd37118f23cec1afb3.zip

  • Size

    5.7MB

  • Sample

    241014-wctmlaxfnf

  • MD5

    d58134f1d4f9f20e53b9f5f3c2850ceb

  • SHA1

    25d420bb1ed4fc867ae63edfd56bc6fd4b99051f

  • SHA256

    74cb24663009dd17c0ca2f8606c6d6b48ec0f68b9d147d632b2fe9fa361c4a7d

  • SHA512

    0ad0487874cd990939886851c22340a7f9b7ada67cb6fa899a2506276dba4c29388a54b8f4baabe5cf32664e190f87381d1c0e7c286a00e999aff8399ea9d3a6

  • SSDEEP

    98304:LfR+3uQtH4cvRDHiTcc3M9GLZwTwqnPCIFHY4DaFjCavYIccNd6n+u2elIR54:L5++W4cucJTwUCF4DiCkUwd6nT2elue

Malware Config

Targets

    • Target

      df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3

    • Size

      13.4MB

    • MD5

      1ce3b67e179c8420bd5b31e75b4427ca

    • SHA1

      4090622f0eadc1b420aa5d55e31ca5cd45e05f12

    • SHA256

      df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3

    • SHA512

      c708cc271fad1ecd29fccb010a34f54ba7b885d8827351a5d8be49f4781185248e789c3e35fa1c7862fdc0bf303e1d97f2585023e0b9fd14db3181f55d276f5f

    • SSDEEP

      98304:aRqeZPPm0Rgmt7M17Lu1zdfj7zyg5oo5AZx8U8qPoBhLTlL4DQWVYHL9fu4h84MR:aMygJ9edfbhSo5Kp8qPKlL8QgYVhqn

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Renames multiple (1380) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks