General
-
Target
2fc2298cdf63f60af0caff24340b417aced238fea9b362a6c166fc1f2a8a2429
-
Size
99KB
-
Sample
221121-vm34cadh7x
-
MD5
3099cd7780df19c7e170d72c93e05510
-
SHA1
cc2c0d808ba6f39876fedade3e1276dab9fdacbf
-
SHA256
2fc2298cdf63f60af0caff24340b417aced238fea9b362a6c166fc1f2a8a2429
-
SHA512
80cd3f80857e2da1fe421de65ec1d0d32524032458d1fe2dd161ef113633b74f2af637eecf6dbe0282ff4f1bf93e0f3cb86dd6a7dcfeb8066b6b1f533ee0db3b
-
SSDEEP
3072:L47excGxFLPkH9SnbZDaJlncrq6NqMi6nHLl:L+eGYtPk0Z+/ceOqSn5
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
149KB
-
MD5
86963b99db7a9d6660798be28b910d61
-
SHA1
99c2e0024d8bf88f592b445d7f33fa82d19a27e1
-
SHA256
4d290ca6bfc7bf253d6c7e40aa8e72f664bc461953e07a0e6461e2f460d0f8ec
-
SHA512
ea5d866e2a0372dd5376a0e45cafe2906b1206c59b86339c9588a1c98b734ec2fcd331e9614b99857fce5f7626614dfac422ed3ba49a57082e52361b2fc33555
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hir1X1sVys8qMi6nHL2:AbXE9OiTGfhEClq9dd1I8qSn6
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-