General

  • Target

    a6676abe0007629a44874c2d869bf3486a0791e7e19d882b37c244af8418f57c

  • Size

    111KB

  • Sample

    221002-1x34zscee5

  • MD5

    5b6241f374d632ed53520631f75f9c60

  • SHA1

    04e80c4c0f72e46b164d0287b39d4fc6f3929fc9

  • SHA256

    a6676abe0007629a44874c2d869bf3486a0791e7e19d882b37c244af8418f57c

  • SHA512

    04df91ae4055103e0f4294ad12a54f38888173e4e619b4282dfc50a36b441cab5f89c6b61f3f0c1cee74901e013f5029ad9b20d2750024655c9b4ccd8a76dbd5

  • SSDEEP

    3072:6nO9QMl+hQ0gInZl7otaIlmiZzD5vlWqXe0BJm53RbG:6OnI0a2minvlQRBbG

Score
8/10

Malware Config

Targets

    • Target

      RUSSKAYA-GOLAYA.exe

    • Size

      168KB

    • MD5

      04291984ee9cbb0147644644b57d1817

    • SHA1

      4ec7b375fcebabf5c0a28f2b7974a6ed56c729ab

    • SHA256

      56fd6bb75620e4015ea62e26a5d4b852222bc1a4b55428383d348b9755f31dfc

    • SHA512

      dd059d2e41195d3ac233f402a24b75a6b1cad1cc90ac5912ea2a9e2d27089f3319bb98a7a8e98ee2ae5ba48a63b8949b8d550f6d49a2f3d929cfb74dbae9b3dc

    • SSDEEP

      3072:EBAp5XhKpN4eOyVTGfhEClj8jTk+0ht0Ijkgna9wVTXe0BJm53Rb0:TbXE9OiTGfhEClq9W0IgsSRBb0

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks