General

  • Target

    410d3db7d7ec6cdcac27d9dc01ab28a4e4b252a4cffb1ff99f2e3658eb52ecef

  • Size

    128KB

  • Sample

    220919-jq32zaehg8

  • MD5

    a9acb8aadd5f071248509c7545c40e78

  • SHA1

    322ec5392dd44aea0dd9402f8e0b4d47c8cae1fc

  • SHA256

    410d3db7d7ec6cdcac27d9dc01ab28a4e4b252a4cffb1ff99f2e3658eb52ecef

  • SHA512

    ea029e95d83c14b18c1a4cb7979717c952d6e462fc4bb97b9354fb3c413b0a246b8c032779c3f95d35b3c4afd3fac0163afe3295c6be2079100c7d76a0f10beb

  • SSDEEP

    3072:RpmgI3tG90HdQ3SqtHwamSx3F7IlyEyB0DPu+JIrVQz:baD9Q3TtHwamly8PuCI4

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      240KB

    • MD5

      934d29283079d878fae23838ff5d156b

    • SHA1

      773c0ba664625a4030af3b8ea321de5ee0e029c6

    • SHA256

      fe9d78c0c394e248da57fc5693fe5cb0a759489c93ae300adef582f1069413c6

    • SHA512

      d410f0196092ad17a00496a587cd135e610efd6af47091731be9040d9426e2d24641e5989dc753d4e9d7ba3f126f8f2ce467f006c303a659cfb8495c8c119fc2

    • SSDEEP

      3072:4BAp5XhKpN4eOyVTGfhEClj8jTk+0hnbGsthRX1Tr+Cgw5CKHe:vbXE9OiTGfhEClq9uLhjyJJUe

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks