General
-
Target
01cb9c164141bc09330e32c1452a727aed39692ad0d3c2d9505bc5ca596378f5
-
Size
99KB
-
Sample
220919-wj8ebsbdf3
-
MD5
e628fcb34407f68cc50f2d76d49faf4d
-
SHA1
22b64904ab73ea47b5e2945744a6efbad996dfb1
-
SHA256
01cb9c164141bc09330e32c1452a727aed39692ad0d3c2d9505bc5ca596378f5
-
SHA512
2123b2da3d94e49c73fb3b32d2658fb5f4b07446f627a43a53336760c0a0884a64162dce02855bd6e8273661185ce68ba36ebfa167ee13fc741eb0b4a0685d1d
-
SSDEEP
3072:C47excGxFLPkH9SnbZDabWDLZKTOrvn7BWe:C+eGYtPk0Z+8Lhrvn4e
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
ff086d0d59b161c9b6c042e902323622
-
SHA1
a5533ae498366582e9b08cc28821ffd1e00f92a7
-
SHA256
abdc11a0da5cdc6e005a8fa09cf6398ec337cf7801cf5231e50e987345812ea3
-
SHA512
c779d69cad19597bf9a619d6f4599d7df4219d77e6144ee694c5076db56013e34781a691d93e6caac15a861b404bc1c15fdce8e70cb02b90ed7a0cc7015738a6
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hieh/zn7BWR:AbXE9OiTGfhEClq9Mh/zn4R
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-