General

  • Target

    349d6294e74693743378fc05a5c602177b506522582676220da695572102f84c

  • Size

    129KB

  • Sample

    220919-bwktksefel

  • MD5

    5e10934617b4eb59c7bfe3452bab125d

  • SHA1

    325d098d63c336343fe654aa52a9cb5948b776ac

  • SHA256

    349d6294e74693743378fc05a5c602177b506522582676220da695572102f84c

  • SHA512

    599f2325b30f02d8169fc0f5a4fd5c1074810669e576e571297f498adcc96e0ae1aaae14ab9f1879d5d08cca4a08d1879eed47667e19f4d82b5cfb56c77283d8

  • SSDEEP

    3072:n3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEvx6yFHOQcD//:nVsZ59zLE+l8a1meaqBjnPHYT3cr

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      239KB

    • MD5

      146ac45dce81221d82db28de10793609

    • SHA1

      262c1b1c7a214d029e08176e62dc91cce12cf0bf

    • SHA256

      859b1ec0db6c55f95692c7a95a50e7d40adfe696595567b99c32436ba9af7c38

    • SHA512

      49b344399e1aef4bc3493e624831d3c4b7155cdb8f88eb41cb70e9b00d4ebb8234f72e78e030bca6c7616c136b331c42f7fd167025e0d3faca195d2b5bfb7a14

    • SSDEEP

      6144:CbXE9OiTGfhEClq9cpRM1qcVVx/Zs3JJUq:qU9Xiui++X

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks