General
-
Target
ab78e6af27bf28eee50ecb5e8ee4b7ed700817d0289e7f0663770f8270794c93
-
Size
122KB
-
Sample
221129-v31yxsae63
-
MD5
e4b38a96cac1d2449197f3934ac719ac
-
SHA1
4dc94bd15a2d571ac0605a169a6e689d6787e999
-
SHA256
ab78e6af27bf28eee50ecb5e8ee4b7ed700817d0289e7f0663770f8270794c93
-
SHA512
df80fee6426f3bcc228414a32f9b7605da4a19c2eac1c36acfb7b3491c3a91abd7b9e7d84a16ab444b289621356b2d5dace574923b8f62f4e0828202a6cd8cd1
-
SSDEEP
3072:KnHXMpxcGxFyhQ0bOqYJWd8qTkF9ec5KqqAgA4DdIxC+Gba9aEI:uHmGY/o0J0T0d5KYgSkS8
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
237KB
-
MD5
a58d8465f840e1fcad4d41d738877384
-
SHA1
9f4111ccada5d50048488955a35f27eccb2fd503
-
SHA256
7946f8a23ac41d420ba85a4e71c108f586cec3b2e8b8a3448f5e4d19404d785f
-
SHA512
8f30fd6128490effb87ca8831843eb7bc1b3a6e31fe0a989b35c1005d050e1b487124aebf21ffa38d2adceb48dfc7dc28835b5ff463a05f0db8c96a77ad5b405
-
SSDEEP
3072:DBAp5XhKpN4eOyVTGfhEClj8jTk+0hT6IPEaG562E3nV9uVSUO2I+Cgw5CKHq:ubXE9OiTGfhEClq9gTuRJJUq
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-