General
-
Target
349d6294e74693743378fc05a5c602177b506522582676220da695572102f84c
-
Size
129KB
-
Sample
220919-bwktksefel
-
MD5
5e10934617b4eb59c7bfe3452bab125d
-
SHA1
325d098d63c336343fe654aa52a9cb5948b776ac
-
SHA256
349d6294e74693743378fc05a5c602177b506522582676220da695572102f84c
-
SHA512
599f2325b30f02d8169fc0f5a4fd5c1074810669e576e571297f498adcc96e0ae1aaae14ab9f1879d5d08cca4a08d1879eed47667e19f4d82b5cfb56c77283d8
-
SSDEEP
3072:n3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEvx6yFHOQcD//:nVsZ59zLE+l8a1meaqBjnPHYT3cr
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
239KB
-
MD5
146ac45dce81221d82db28de10793609
-
SHA1
262c1b1c7a214d029e08176e62dc91cce12cf0bf
-
SHA256
859b1ec0db6c55f95692c7a95a50e7d40adfe696595567b99c32436ba9af7c38
-
SHA512
49b344399e1aef4bc3493e624831d3c4b7155cdb8f88eb41cb70e9b00d4ebb8234f72e78e030bca6c7616c136b331c42f7fd167025e0d3faca195d2b5bfb7a14
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/Zs3JJUq:qU9Xiui++X
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-