General

  • Target

    0c7eaef69c1350a123dc052c94c1ff33ccb3e05c9593dcc556b3c4251c1deebc

  • Size

    1.1MB

  • Sample

    250311-yerxwstvdw

  • MD5

    33ef34d235239ea11154f9fc55659435

  • SHA1

    0d03c8206554ad647de7b7b4ca7b5407402a9bbe

  • SHA256

    0c7eaef69c1350a123dc052c94c1ff33ccb3e05c9593dcc556b3c4251c1deebc

  • SHA512

    9f4032fd711494b4a0ed15790a0f0da9786f89fbfb0fe60e2dbcbb0f21bf841cd525b1d65f6c63cbac311b8ad25521dd3f7db70054f83277c957b467d7f85f74

  • SSDEEP

    12288:tPKysX3jbmFgmi781keHdrb/9Z/gg/0paQuj3Qs9MdD02fKBjtp/SaoMK5mle1T1:YPsgmi781ke93/B0GvjrarJAk

Malware Config

Targets

    • Target

      0c7eaef69c1350a123dc052c94c1ff33ccb3e05c9593dcc556b3c4251c1deebc

    • Size

      1.1MB

    • MD5

      33ef34d235239ea11154f9fc55659435

    • SHA1

      0d03c8206554ad647de7b7b4ca7b5407402a9bbe

    • SHA256

      0c7eaef69c1350a123dc052c94c1ff33ccb3e05c9593dcc556b3c4251c1deebc

    • SHA512

      9f4032fd711494b4a0ed15790a0f0da9786f89fbfb0fe60e2dbcbb0f21bf841cd525b1d65f6c63cbac311b8ad25521dd3f7db70054f83277c957b467d7f85f74

    • SSDEEP

      12288:tPKysX3jbmFgmi781keHdrb/9Z/gg/0paQuj3Qs9MdD02fKBjtp/SaoMK5mle1T1:YPsgmi781ke93/B0GvjrarJAk

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (10419) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks