General

  • Target

    5c9f64fea519c95f0fb7c7578a3c8cbabcc169511357c223274cd85394504b88

  • Size

    124KB

  • Sample

    220919-bk6a5saag2

  • MD5

    2dcda6fe917be2d7695b223cefbe441b

  • SHA1

    f404406c77d1c1ddf1485e73264bbaa62479b428

  • SHA256

    5c9f64fea519c95f0fb7c7578a3c8cbabcc169511357c223274cd85394504b88

  • SHA512

    37a07fff1adc966146fb7c9d4a2408c107b101a97f4c4093684652879b8272d2b297ed6b52aff50269cf792e1fc9825961a2c551136ce47e6832a96165df4515

  • SSDEEP

    3072:nnHXMpxcGxFyhQ0bOqYJrC06GdkEfj+BcB9AHDMVTCjtM:nHmGY/o0JrV6GJ+q98DMxsM

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      239KB

    • MD5

      6839c4c1e533bdef312fa9501b7cd622

    • SHA1

      0a4a288e686a64c0d926e5d5c7ddd46ec7eeeaa1

    • SHA256

      5b40e9c2a5bbd190d09eade750b1ce1a48887f6822a3e8a4cf3f927c38088982

    • SHA512

      d0cafe97a7ab0444424d88d6fddbe2bb0bc9d33abaaeec21101388982d40728d5114d30d1d9b3f7b5d0ea77cbfc6f8067256d4cd7613d14de74ccd196a1dd954

    • SSDEEP

      3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hYoO/MgjqEWBz+Cgw5CKHy:7bXE9OiTGfhEClq95/MgXJJUy

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks