General
-
Target
f18246fcf7048b6eea8167fb81ef4e2fb307b847ed05c8fa73a92ce4b54c3c5a
-
Size
99KB
-
Sample
220919-v7vygaeecj
-
MD5
ce972d66e0eb7ca48a7afde295221321
-
SHA1
60b765b6480d564064aba0b99ebd7d1c7ebdb20f
-
SHA256
f18246fcf7048b6eea8167fb81ef4e2fb307b847ed05c8fa73a92ce4b54c3c5a
-
SHA512
a8d97bd695c195cb90f53affdd525de0963991f5c2ec0d7f3773ca2287e16b623c5c0996f9d53d0c1784225536bbe52649319f80804735e6ffad3d88688cce8c
-
SSDEEP
3072:d47excGxFLPkH9SnbZDazFA1XdqXIX4Utjn:d+eGYtPk0Z+zO/qYn
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
149KB
-
MD5
8038ebcd984916c69c58ede697dbe7b4
-
SHA1
94e4561a06e0b423bc5b76c49234a977a869aae8
-
SHA256
ae6226759da82fa559e63bc55b1e62a103c98fae2d246b81d43eae1826c99064
-
SHA512
1acbf5b396f5e88c85ad4e86cf25ad2722f681d42c31bdc113f66c70a8fa6015da20af4a0418e75fbdb350c09c80785fd08e2161b5cdb5ae067636e5715355bf
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi38puk4NUtjV:AbXE9OiTGfhEClq9qptV
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-