General
-
Target
4d8ce1e928f02d2e59bf18952dd46bd01358cc2d4a031f347e1b30f0cba8dd97
-
Size
110KB
-
Sample
220919-b843zsfcfk
-
MD5
033aa71dbb84bdbfaa5812797712ac9b
-
SHA1
0429d2dd1e4852ec50cf5504ba70fab437af0f2c
-
SHA256
4d8ce1e928f02d2e59bf18952dd46bd01358cc2d4a031f347e1b30f0cba8dd97
-
SHA512
da4b3f4cdd1c826fd060e26df469ea851e1012814a65394b31963c0235e6c80c4c93d84b9ea69ab713b83483675ab15ac57acb11b283b6f852e4ea118a5c9307
-
SSDEEP
1536:nQWQFGFI/PvgCRN59/ir/zMBq47OOKVUiaRFBsyfaoiv01GJuTzz/WOjm1iwB1:Qrz/BRgr/gcwOHZaRFB1faoivATNWR
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
239KB
-
MD5
d846ad886409b8b0d03e5c24428bf704
-
SHA1
dad52d3bb16186cf05e9c24467f7211657b87052
-
SHA256
55653362ca3a75256d74c3fb61eee8eb83ccd33ae9a2df11b49fdae44662e921
-
SHA512
2fda96e83743702291cd4148a1758c58f95f7d00f67603763799fbb3c9614895c0ac01cb2cb81eb1c8c1865075a166fe82df901db57e36857d17e43b3f1db44e
-
SSDEEP
3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hbe+s461efwvsOq7Mirevf0o3+2GFZB4Qyd:7bXE9OiTGfhEClq9umJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-