General
-
Target
c3967c8fda4f5a35c5707ad918ee8773d79ae19a9e45ea363b8b1ae408c60e3b
-
Size
99KB
-
Sample
220919-wq6jbafegp
-
MD5
b83b8089125e41bf4daa9f4087ae3164
-
SHA1
96205e2098b888ced53afe0212a913bc12ff2505
-
SHA256
c3967c8fda4f5a35c5707ad918ee8773d79ae19a9e45ea363b8b1ae408c60e3b
-
SHA512
e3dc4bc99d6be83b3a2d2d3bb325ef299e9084010860429709b0334a3fe51d9c2a311ca72c51c7abb3f311899afad2024b6b1843782cd60ae95740bb111ad9f3
-
SSDEEP
3072:k47excGxFLPkH9SnbZDaIcsMYwcWlRZ7LTMF+L7Dpk:k+eGYtPk0Z+KqhEF+L7Dy
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
45948515abac612ef6990c8afb6a2fc8
-
SHA1
e945d0b8e6e33477dfbca2c18f5517554945f21f
-
SHA256
5d9cf712292390a61de64ba8549352013e69aaf497555483afedb5b14454c387
-
SHA512
d55ff0944f80342fa81aaff2c243e6a8271ab01ea02b91354277a774bc2a94a3a2f5a0aaede1bf5bcaf0e075b01bab557525098803a5fe4fbfb43ed56ec0b724
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hio1mLMF7Dpn:AbXE9OiTGfhEClq9u1YMF7D1
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-