General

  • Target

    01cb9c164141bc09330e32c1452a727aed39692ad0d3c2d9505bc5ca596378f5

  • Size

    99KB

  • Sample

    220919-wj8ebsbdf3

  • MD5

    e628fcb34407f68cc50f2d76d49faf4d

  • SHA1

    22b64904ab73ea47b5e2945744a6efbad996dfb1

  • SHA256

    01cb9c164141bc09330e32c1452a727aed39692ad0d3c2d9505bc5ca596378f5

  • SHA512

    2123b2da3d94e49c73fb3b32d2658fb5f4b07446f627a43a53336760c0a0884a64162dce02855bd6e8273661185ce68ba36ebfa167ee13fc741eb0b4a0685d1d

  • SSDEEP

    3072:C47excGxFLPkH9SnbZDabWDLZKTOrvn7BWe:C+eGYtPk0Z+8Lhrvn4e

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      149KB

    • MD5

      ff086d0d59b161c9b6c042e902323622

    • SHA1

      a5533ae498366582e9b08cc28821ffd1e00f92a7

    • SHA256

      abdc11a0da5cdc6e005a8fa09cf6398ec337cf7801cf5231e50e987345812ea3

    • SHA512

      c779d69cad19597bf9a619d6f4599d7df4219d77e6144ee694c5076db56013e34781a691d93e6caac15a861b404bc1c15fdce8e70cb02b90ed7a0cc7015738a6

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hieh/zn7BWR:AbXE9OiTGfhEClq9Mh/zn4R

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks