General
-
Target
5c9f64fea519c95f0fb7c7578a3c8cbabcc169511357c223274cd85394504b88
-
Size
124KB
-
Sample
220919-bk6a5saag2
-
MD5
2dcda6fe917be2d7695b223cefbe441b
-
SHA1
f404406c77d1c1ddf1485e73264bbaa62479b428
-
SHA256
5c9f64fea519c95f0fb7c7578a3c8cbabcc169511357c223274cd85394504b88
-
SHA512
37a07fff1adc966146fb7c9d4a2408c107b101a97f4c4093684652879b8272d2b297ed6b52aff50269cf792e1fc9825961a2c551136ce47e6832a96165df4515
-
SSDEEP
3072:nnHXMpxcGxFyhQ0bOqYJrC06GdkEfj+BcB9AHDMVTCjtM:nHmGY/o0JrV6GJ+q98DMxsM
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
239KB
-
MD5
6839c4c1e533bdef312fa9501b7cd622
-
SHA1
0a4a288e686a64c0d926e5d5c7ddd46ec7eeeaa1
-
SHA256
5b40e9c2a5bbd190d09eade750b1ce1a48887f6822a3e8a4cf3f927c38088982
-
SHA512
d0cafe97a7ab0444424d88d6fddbe2bb0bc9d33abaaeec21101388982d40728d5114d30d1d9b3f7b5d0ea77cbfc6f8067256d4cd7613d14de74ccd196a1dd954
-
SSDEEP
3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hYoO/MgjqEWBz+Cgw5CKHy:7bXE9OiTGfhEClq95/MgXJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-