General
-
Target
e2db2ccd5f5de520680b1b16ba0a47e65f3cdbab67cc0ec0cac048172490aefd
-
Size
99KB
-
Sample
221121-vmy5dsdh61
-
MD5
3b01922c4cfdcd0bfedf6ed94931d760
-
SHA1
cf45b5cf7298d1ea91d1d2b0bc45e076df674204
-
SHA256
e2db2ccd5f5de520680b1b16ba0a47e65f3cdbab67cc0ec0cac048172490aefd
-
SHA512
71b20c1d8a5c3fa1dd9ed9fce2ba47ad1f00bad2b4328e4e31aeae65b88b35d727e8d9b000439f7c9512ef27adba7b9d0e76c602a8a51d1e780b579a4db2d340
-
SSDEEP
3072:e47excGxFLPkH9SnbZDaBJ9Cg8ZV6gYJCWyekaG:e+eGYtPk0Z+5CgIi2eu
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
149KB
-
MD5
ce2c59183c953db0a928dd2b35617782
-
SHA1
57a06ae1bf3e53eb433370e153d59e955673d3ce
-
SHA256
a9c84d69a5b984ad536e841e7862be252607c6e58fbc08865dff980309013125
-
SHA512
5668235ffd3fee5ccfa70afc0b11a0fe0ce5290015ea6478ca3c67d88563e1fb935d43ff1ec1a22cf657eb2e75b55aec623bf949c8473fa4271ff573a5cb3a96
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi5KoCWyekax:AbXE9OiTGfhEClq9+o2e5
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-