General
-
Target
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f
-
Size
1.5MB
-
Sample
250325-z2gwwawnt2
-
MD5
b052a29c5f0882c9a2f70dce0411f461
-
SHA1
619c21406d4db145cdf1d6947e96f210f212467f
-
SHA256
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f
-
SHA512
85497c6fdb77678e3a1f8f619afd7d17b306e5d39e4bd5c9d345b53e68942abb4ce00cb9706f92b2f13aac4ece52e9372e199b5400d1fc7ab10001d32fddc526
-
SSDEEP
24576:c4BeWGulqEiDYdGL5JpmO9QDJoAOM08/85RkptVIJqG:rGEiDYdyEQcOMjUfkptVxG
Static task
static1
Behavioral task
behavioral1
Sample
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f
-
Size
1.5MB
-
MD5
b052a29c5f0882c9a2f70dce0411f461
-
SHA1
619c21406d4db145cdf1d6947e96f210f212467f
-
SHA256
97c902feebf934401e24d65a743a095475814dbfba6465a7e5c3837dde0e4d1f
-
SHA512
85497c6fdb77678e3a1f8f619afd7d17b306e5d39e4bd5c9d345b53e68942abb4ce00cb9706f92b2f13aac4ece52e9372e199b5400d1fc7ab10001d32fddc526
-
SSDEEP
24576:c4BeWGulqEiDYdGL5JpmO9QDJoAOM08/85RkptVIJqG:rGEiDYdyEQcOMjUfkptVxG
Score10/10-
Azov family
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-