General
-
Target
8de8c8b8f70eb29165f9426a4a54ecc7dc1b8fc57f7b0be2057f9b228e461b4c
-
Size
117KB
-
Sample
220919-bpnlwsacd8
-
MD5
ef93bea0e409dab02826be764a1f13f6
-
SHA1
2d87112cafa0dfc6a12a0ede7d098f0d1496c2e3
-
SHA256
8de8c8b8f70eb29165f9426a4a54ecc7dc1b8fc57f7b0be2057f9b228e461b4c
-
SHA512
d067dc41043b559a021d39405fab95b5db2e8960465c12f92e1f4cc312a9d5ad0a4fe1879013e9f17ff18b039e2dde803bf019eeebe9c8a840b8b6f20c3b8d51
-
SSDEEP
3072:Pl0img13tG90HdQ3SqtER11DhcriIg/8Jb1/lNQEzWWXcZAdePuj:PljpD9Q3TtA1tcg8JnNLFXIAI2j
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
239KB
-
MD5
5ddfe645d3cbe2590b34e5afa2deb822
-
SHA1
df310df675c59e8958aef6ce041e78118696ad5e
-
SHA256
b13c0037e3ac532d246bd13e0e096509fd2fe9fa688de1bea39596368fa3341a
-
SHA512
ccd3706dcd7dba5543187ef6375d34eee6a07807046386f7ab0540583a9f583f583bcd7157f2c756dbb0c08f399c65aca20652ee698378d2e255cd41ce7e4ed4
-
SSDEEP
3072:cBAp5XhKpN4eOyVTGfhEClj8jTk+0h1Rqsrf6XFfuoyTNwTJSFya+Cgw5CKHG:LbXE9OiTGfhEClq9+6btJJUG
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-