General

  • Target

    729e4c26fc975feb7393d0e9396aaede3cc2e27b0155a291ac83af80af242f70

  • Size

    128KB

  • Sample

    220919-b64pfafbfq

  • MD5

    db611b614403aadfbde73923788a0591

  • SHA1

    5585cdc6d7631cd4b2aa9744cf5d16035a138f75

  • SHA256

    729e4c26fc975feb7393d0e9396aaede3cc2e27b0155a291ac83af80af242f70

  • SHA512

    f5a5f6021b09a4eac2ace5d993d09b562e5f92a669c4246f73781b22fd021e169c5e04edfc1296891455f9a4be8da30c8545f808c1fe340facde2b27ae495cb3

  • SSDEEP

    3072:qnHXMpxcGxFyhQ0bOqYoxIcEWubRNcPe9d8T2R:OHmGY/o0o+hBbnF9GCR

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      239KB

    • MD5

      cc3e79604fed1f63c7f5f24916fd1d51

    • SHA1

      08872ad23e2e9e897d30506d783ed15f4491a25b

    • SHA256

      d74b26bea7fd5d0206c63b5251569a57c889debb2cac8e5ad8908a658b8fcd2a

    • SHA512

      22c20dc56f46e44e522eac57ded0da8b571e6da2fd37f083509846bb557e513081daddd4d7d9d6cce86d7216ffdfb4ac6e4311e2259dca956d1af5253630e547

    • SSDEEP

      3072:QBAp5XhKpN4eOyVTGfhEClj8jTk+0hijkEDboYxU044U/13+Cgw5CKHy:HbXE9OiTGfhEClq9YEXoyDjUEJJUy

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks