General
-
Target
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2
-
Size
1.5MB
-
Sample
250313-krax9a1zbz
-
MD5
32e6e16b55bbd073958c98f9d47f92e7
-
SHA1
6abf691d3a8752a6b52f1a1adfe56571f963dcee
-
SHA256
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2
-
SHA512
1661c40d4148de7e4beb3410bbedeb5ba0583c1d7f6899eb6a09aad1686db5f6097cc26c17f8d8da77d2b8af7fa4ed3847641630d85b4de15f0fdbb366e46986
-
SSDEEP
24576:+RHe6IXGtlqIBPtk0mBRYETIoZJoAOM08/85RkptVIJqaBjp1:wmVIBlkRTVOMjUfkptVxaBjp1
Static task
static1
Behavioral task
behavioral1
Sample
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2
-
Size
1.5MB
-
MD5
32e6e16b55bbd073958c98f9d47f92e7
-
SHA1
6abf691d3a8752a6b52f1a1adfe56571f963dcee
-
SHA256
95a24a70d322e14fb2f252c6e8995ddc459d2e744ce2cb8e5013030265edf4c2
-
SHA512
1661c40d4148de7e4beb3410bbedeb5ba0583c1d7f6899eb6a09aad1686db5f6097cc26c17f8d8da77d2b8af7fa4ed3847641630d85b4de15f0fdbb366e46986
-
SSDEEP
24576:+RHe6IXGtlqIBPtk0mBRYETIoZJoAOM08/85RkptVIJqaBjp1:wmVIBlkRTVOMjUfkptVxaBjp1
Score10/10-
Azov family
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-