General
-
Target
8e10e89beaa7e1d41ad28eefa747607f0ca43ee972548e93b8b7e7bd68ba7013
-
Size
99KB
-
Sample
220919-v5ehpsaeg5
-
MD5
c17b3cc24c48876f4dfa90ff021765bd
-
SHA1
a636ca75ff5d8a61ccb67cc172b29809d382132b
-
SHA256
8e10e89beaa7e1d41ad28eefa747607f0ca43ee972548e93b8b7e7bd68ba7013
-
SHA512
dd0c0802ab1268b52dd3313ab90ff9ce937aca77458e28883d04c0fa23736a08c723b3f0694b604b815cf52c4b6a3bc61f8446ebb78e487784f95c00617fa6c1
-
SSDEEP
3072:E47excGxFLPkH9SnbZDa0fkU37D7mEHjeZRewlI:E+eGYtPk0Z+0fBD2RewlI
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
f017add0319b24def517032c3b93b06f
-
SHA1
69aa7ec014e3cab55ef2f4df20e70d6856e76927
-
SHA256
1fccd0adbb781ba2f3c9dd5340069470ea79410cb57d8d206b29dd011dd5e46e
-
SHA512
9cc4a05e4b253f3f285154b82fc8945a1e00a3607feacbd20973480732a6fed210987ce42e32d24f74d582775f1ca045774054f3e4aae5c7b9ca5d41e2950d9c
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiY9ruInWRewlt:AbXE9OiTGfhEClq98PWRewlt
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-