General
-
Target
a08fcc3c0bb86b5c2176a650e4a7d6849ed37178185d6b6f96901674c2d83296
-
Size
99KB
-
Sample
221011-swtj6abff9
-
MD5
6a86769b23b21d81ca15f5ce23b48010
-
SHA1
8fae743d6ea7d7acdef35835fa25ff5b4551a2e8
-
SHA256
a08fcc3c0bb86b5c2176a650e4a7d6849ed37178185d6b6f96901674c2d83296
-
SHA512
dcd462dfa14da7d91af3d0b7150e50a4aafa62f10315623dc72d1b3d38960f245b6dadde7b31f7b3b4ce8072c24875cd825ee864ca495456470cdd83999f0bdf
-
SSDEEP
3072:Y47excGxFLPkH9SnbZDaBJ9Cg8ZV6gYJCWyekac:Y+eGYtPk0Z+5CgIi2eU
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
ce2c59183c953db0a928dd2b35617782
-
SHA1
57a06ae1bf3e53eb433370e153d59e955673d3ce
-
SHA256
a9c84d69a5b984ad536e841e7862be252607c6e58fbc08865dff980309013125
-
SHA512
5668235ffd3fee5ccfa70afc0b11a0fe0ce5290015ea6478ca3c67d88563e1fb935d43ff1ec1a22cf657eb2e75b55aec623bf949c8473fa4271ff573a5cb3a96
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi5KoCWyekax:AbXE9OiTGfhEClq9+o2e5
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-