General
-
Target
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2
-
Size
1.5MB
-
Sample
250313-nsk2ds1yez
-
MD5
05a7cd4fc219f4460fb0484b13c76dd7
-
SHA1
19cb5db410b19153e6430e801c1531fb2e1e6348
-
SHA256
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2
-
SHA512
c9951795e0f074a9834932fb7a73738ef67ccc5592a668dd112aad477aa1f9036536e1d5570ff6018f96235acee23010eb8565044a2fa622e8106dccf5b31b41
-
SSDEEP
24576:jBjY6kG7lqfbT+/tpdriEUVoZJoAOM08/85RkptVIJqAkfRY:lafby/HrHOMjUfkptVxDY
Static task
static1
Behavioral task
behavioral1
Sample
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2
-
Size
1.5MB
-
MD5
05a7cd4fc219f4460fb0484b13c76dd7
-
SHA1
19cb5db410b19153e6430e801c1531fb2e1e6348
-
SHA256
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2
-
SHA512
c9951795e0f074a9834932fb7a73738ef67ccc5592a668dd112aad477aa1f9036536e1d5570ff6018f96235acee23010eb8565044a2fa622e8106dccf5b31b41
-
SSDEEP
24576:jBjY6kG7lqfbT+/tpdriEUVoZJoAOM08/85RkptVIJqAkfRY:lafby/HrHOMjUfkptVxDY
Score10/10-
Azov family
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-