General
-
Target
7cf016de45738ba6185b3147b79cdd379eeba349f25dd9ec0a0e1c38a840ef13
-
Size
119KB
-
Sample
220919-bm2ezaebfq
-
MD5
ac3539119bc4c9c7389e5372edd7f04c
-
SHA1
8a640881b11ebce7e5de667ff11254ea86577ca8
-
SHA256
7cf016de45738ba6185b3147b79cdd379eeba349f25dd9ec0a0e1c38a840ef13
-
SHA512
8ea17f5f9a94af31cf98589a0cdeb5a7f246b8dbf6d452861550717500aa7196b03583a408ef6cf32c3d4f6d18ffcaac66be720d884d363838c50a8363d5782e
-
SSDEEP
1536:5QWQFGFI/PvgCRN59/i8O0j7qiri2MoHOEbIYhcuvEharGgB4zIKT76Nfvh+mZcY:6rz/BRg8OedmAA2cuYaSgB4cEGNfNZz
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
239KB
-
MD5
fb283be46a04fb2e67194fe1ca5b0ef5
-
SHA1
8232d64b97c868bdc057114dc5ae6777ca670464
-
SHA256
d7013f8ee36859bd40b4c7f32bca136c1ec82fb2e95634f0de64abca80076007
-
SHA512
9faa8e0b50f35352a6c86993ab2945cef3e2bf3f616b4905669a9fde43c9bcfdb775513bcba28f81c2d098002873c6f1ee654929afab5a825ab27a948a72b023
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0hMg6X2JHBM6yJMMvy/3+Cgw5CKHG:+bXE9OiTGfhEClq9fgMbnMMPJJUG
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-