General

  • Target

    8e10e89beaa7e1d41ad28eefa747607f0ca43ee972548e93b8b7e7bd68ba7013

  • Size

    99KB

  • Sample

    220919-v5ehpsaeg5

  • MD5

    c17b3cc24c48876f4dfa90ff021765bd

  • SHA1

    a636ca75ff5d8a61ccb67cc172b29809d382132b

  • SHA256

    8e10e89beaa7e1d41ad28eefa747607f0ca43ee972548e93b8b7e7bd68ba7013

  • SHA512

    dd0c0802ab1268b52dd3313ab90ff9ce937aca77458e28883d04c0fa23736a08c723b3f0694b604b815cf52c4b6a3bc61f8446ebb78e487784f95c00617fa6c1

  • SSDEEP

    3072:E47excGxFLPkH9SnbZDa0fkU37D7mEHjeZRewlI:E+eGYtPk0Z+0fBD2RewlI

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      149KB

    • MD5

      f017add0319b24def517032c3b93b06f

    • SHA1

      69aa7ec014e3cab55ef2f4df20e70d6856e76927

    • SHA256

      1fccd0adbb781ba2f3c9dd5340069470ea79410cb57d8d206b29dd011dd5e46e

    • SHA512

      9cc4a05e4b253f3f285154b82fc8945a1e00a3607feacbd20973480732a6fed210987ce42e32d24f74d582775f1ca045774054f3e4aae5c7b9ca5d41e2950d9c

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiY9ruInWRewlt:AbXE9OiTGfhEClq98PWRewlt

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks