General

  • Target

    185ba8350fcc6bcd234c865fe5f5000ed419e3ee270bd51d9b852139b75218ad

  • Size

    100KB

  • Sample

    250311-y4vebatms8

  • MD5

    be24e7f5701d993a8b8e39a0460a5d0b

  • SHA1

    aacd9afe20db202754e70f7391e9586b302a4de9

  • SHA256

    185ba8350fcc6bcd234c865fe5f5000ed419e3ee270bd51d9b852139b75218ad

  • SHA512

    66059b92013339bb957fb5ca2f56fe2d8ccb33c08813ba1780f437cd76fed871366b4224e6948ac8318ec50d153665d0ed787200fd3f6a6ae23c43795def544c

  • SSDEEP

    3072:e0gU39FcETx4rY6qvdthQkqkJpNuF/135g3h:e0gs9J6I/QkqSNK//gR

Malware Config

Targets

    • Target

      185ba8350fcc6bcd234c865fe5f5000ed419e3ee270bd51d9b852139b75218ad

    • Size

      100KB

    • MD5

      be24e7f5701d993a8b8e39a0460a5d0b

    • SHA1

      aacd9afe20db202754e70f7391e9586b302a4de9

    • SHA256

      185ba8350fcc6bcd234c865fe5f5000ed419e3ee270bd51d9b852139b75218ad

    • SHA512

      66059b92013339bb957fb5ca2f56fe2d8ccb33c08813ba1780f437cd76fed871366b4224e6948ac8318ec50d153665d0ed787200fd3f6a6ae23c43795def544c

    • SSDEEP

      3072:e0gU39FcETx4rY6qvdthQkqkJpNuF/135g3h:e0gs9J6I/QkqSNK//gR

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (443) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks