General
-
Target
97b60346134d5a568c08eb0207f09a2781acd2905ff406b8af7833b503ca9340
-
Size
99KB
-
Sample
221030-h4s89ahac3
-
MD5
5e1196bd35931c8b9255e0bc819b9750
-
SHA1
163c9e2f2a6f5dc3d8d7bb4eff55371b10690cfb
-
SHA256
97b60346134d5a568c08eb0207f09a2781acd2905ff406b8af7833b503ca9340
-
SHA512
026fe97f41b3b703998003703f47d0329b8ea0367c6fc506553539fb8c410d7c8909dd611a8c747385a94be448f5d2e2921fb905a4ff359a61cdd02a5d531dce
-
SSDEEP
3072:947excGxFLPkH9SnbZDaJlncrq6NqMi6nHLz:9+eGYtPk0Z+/ceOqSnX
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
149KB
-
MD5
86963b99db7a9d6660798be28b910d61
-
SHA1
99c2e0024d8bf88f592b445d7f33fa82d19a27e1
-
SHA256
4d290ca6bfc7bf253d6c7e40aa8e72f664bc461953e07a0e6461e2f460d0f8ec
-
SHA512
ea5d866e2a0372dd5376a0e45cafe2906b1206c59b86339c9588a1c98b734ec2fcd331e9614b99857fce5f7626614dfac422ed3ba49a57082e52361b2fc33555
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hir1X1sVys8qMi6nHL2:AbXE9OiTGfhEClq9dd1I8qSn6
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-