SYMBOLCOMMON_NAMEaka. SYNONYMS
win.azov_wiper (Back to overview)

Azov Wiper


According to Checkpoint, this malware is a wiper instead of ransomware as self-announced. It is manually written in FASM, unrecoverably overwriting data in blocks of 666 bytes, using multi-threading.

References
2023-01-24FortinetGeri Revay
@online{revay:20230124:year:00a1450, author = {Geri Revay}, title = {{The Year of the Wiper}}, date = {2023-01-24}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/the-year-of-the-wiper}, language = {English}, urldate = {2023-01-25} } The Year of the Wiper
Azov Wiper Bruh Wiper CaddyWiper Cobalt Strike Vidar
2022-12-12CheckpointJiří Vinopal
@online{vinopal:20221212:pulling:7b5315a, author = {Jiří Vinopal}, title = {{Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper}}, date = {2022-12-12}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2022/pulling-the-curtains-on-azov-ransomware-not-a-skidsware-but-polymorphic-wiper/}, language = {English}, urldate = {2022-12-13} } Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper
Azov Wiper
2022-11-02Twitter (@_CPResearch_)Checkpoint Research
@online{research:20221102:azov:9f43496, author = {Checkpoint Research}, title = {{Tweet on Azov Wiper}}, date = {2022-11-02}, organization = {Twitter (@_CPResearch_)}, url = {https://twitter.com/_CPResearch_/status/1587837524604465153}, language = {English}, urldate = {2022-11-09} } Tweet on Azov Wiper
Azov Wiper
Yara Rules
[TLP:WHITE] win_azov_wiper_auto (20230125 | Detects win.azov_wiper.)
rule win_azov_wiper_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.azov_wiper."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.azov_wiper"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6685c0 75f0 488d47fe 6683780200 }
            // n = 4, score = 100
            //   6685c0               | mov                 eax, dword ptr [edx + 0x10]
            //   75f0                 | cmp                 dword ptr [eax], 0x29a
            //   488d47fe             | je                  0x4ea
            //   6683780200           | jmp                 0x4b3

        $sequence_1 = { 48898c2470080000 4c8b10 488d842470080000 4889442438 48894c2430 }
            // n = 5, score = 100
            //   48898c2470080000     | mov                 ecx, 0x200
            //   4c8b10               | rep stosb           byte ptr es:[edi], al
            //   488d842470080000     | xor                 edi, edi
            //   4889442438           | nop                 dword ptr [eax]
            //   48894c2430           | mov                 ecx, 1

        $sequence_2 = { 41ff5120 8bc3 488b9c2488000000 4883c440 415f 415c }
            // n = 6, score = 100
            //   41ff5120             | dec                 eax
            //   8bc3                 | mov                 dword ptr [esp + 0x28], ebx
            //   488b9c2488000000     | dec                 esp
            //   4883c440             | mov                 ecx, dword ptr [eax]
            //   415f                 | inc                 ecx
            //   415c                 | call                dword ptr [ecx + 0x20]

        $sequence_3 = { 4883c408 488b4c24f8 488b0c24 4883c408 ffd0 ad 55 }
            // n = 7, score = 100
            //   4883c408             | mov                 ecx, dword ptr [esp - 8]
            //   488b4c24f8           | dec                 eax
            //   488b0c24             | mov                 ecx, dword ptr [esp]
            //   4883c408             | dec                 eax
            //   ffd0                 | add                 esp, 8
            //   ad                   | call                eax
            //   55                   | dec                 eax

        $sequence_4 = { 5e c3 b801000000 488b7c2430 }
            // n = 4, score = 100
            //   5e                   | xor                 eax, eax
            //   c3                   | dec                 eax
            //   b801000000           | add                 esp, 0x20
            //   488b7c2430           | dec                 eax

        $sequence_5 = { 7419 8bc8 488d144a 66833a5c 740b 4883ea02 83c0ff }
            // n = 7, score = 100
            //   7419                 | dec                 eax
            //   8bc8                 | mov                 eax, dword ptr [eax]
            //   488d144a             | inc                 esp
            //   66833a5c             | lea                 eax, [ebp + 1]
            //   740b                 | call                dword ptr [eax + 0x38]
            //   4883ea02             | dec                 eax
            //   83c0ff               | mov                 ebx, eax

        $sequence_6 = { 7310 488b07 b910270000 ff9000010000 eb95 488b3f 4c8d0509fdffff }
            // n = 7, score = 100
            //   7310                 | dec                 eax
            //   488b07               | mov                 edi, dword ptr [esp + 0x310]
            //   b910270000           | dec                 eax
            //   ff9000010000         | cmp                 edi, dword ptr [esp + 0x318]
            //   eb95                 | jge                 0xba6
            //   488b3f               | dec                 eax
            //   4c8d0509fdffff       | xchg                eax, ecx

        $sequence_7 = { 57 4883ec50 488d0581fbffff 488bf1 498943c8 }
            // n = 5, score = 100
            //   57                   | inc                 ecx
            //   4883ec50             | add                 ecx, 0x26fe2
            //   488d0581fbffff       | inc                 ecx
            //   488bf1               | add                 edx, 0x26fe2
            //   498943c8             | inc                 ecx

        $sequence_8 = { 4883ec08 48890c24 48c7c1619afeff 4883ec08 48890c24 }
            // n = 5, score = 100
            //   4883ec08             | dec                 eax
            //   48890c24             | mov                 edx, dword ptr [ecx]
            //   48c7c1619afeff       | call                dword ptr [edx + 0x118]
            //   4883ec08             | je                  0x955
            //   48890c24             | xor                 edx, edx

        $sequence_9 = { 48890c24 48c7c1619afeff 4883ec08 48890c24 48c7c1cb730100 }
            // n = 5, score = 100
            //   48890c24             | mov                 eax, dword ptr [edx]
            //   48c7c1619afeff       | xor                 ecx, ecx
            //   4883ec08             | cmp                 dword ptr [ecx + 0x20], 0
            //   48890c24             | je                  0xc75
            //   48c7c1cb730100       | dec                 eax

    condition:
        7 of them and filesize < 73728
}
Download all Yara Rules