General
-
Target
a6676abe0007629a44874c2d869bf3486a0791e7e19d882b37c244af8418f57c
-
Size
111KB
-
Sample
221002-1x34zscee5
-
MD5
5b6241f374d632ed53520631f75f9c60
-
SHA1
04e80c4c0f72e46b164d0287b39d4fc6f3929fc9
-
SHA256
a6676abe0007629a44874c2d869bf3486a0791e7e19d882b37c244af8418f57c
-
SHA512
04df91ae4055103e0f4294ad12a54f38888173e4e619b4282dfc50a36b441cab5f89c6b61f3f0c1cee74901e013f5029ad9b20d2750024655c9b4ccd8a76dbd5
-
SSDEEP
3072:6nO9QMl+hQ0gInZl7otaIlmiZzD5vlWqXe0BJm53RbG:6OnI0a2minvlQRBbG
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
168KB
-
MD5
04291984ee9cbb0147644644b57d1817
-
SHA1
4ec7b375fcebabf5c0a28f2b7974a6ed56c729ab
-
SHA256
56fd6bb75620e4015ea62e26a5d4b852222bc1a4b55428383d348b9755f31dfc
-
SHA512
dd059d2e41195d3ac233f402a24b75a6b1cad1cc90ac5912ea2a9e2d27089f3319bb98a7a8e98ee2ae5ba48a63b8949b8d550f6d49a2f3d929cfb74dbae9b3dc
-
SSDEEP
3072:EBAp5XhKpN4eOyVTGfhEClj8jTk+0ht0Ijkgna9wVTXe0BJm53Rb0:TbXE9OiTGfhEClq9W0IgsSRBb0
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-