General

  • Target

    ab78e6af27bf28eee50ecb5e8ee4b7ed700817d0289e7f0663770f8270794c93

  • Size

    122KB

  • Sample

    221129-v31yxsae63

  • MD5

    e4b38a96cac1d2449197f3934ac719ac

  • SHA1

    4dc94bd15a2d571ac0605a169a6e689d6787e999

  • SHA256

    ab78e6af27bf28eee50ecb5e8ee4b7ed700817d0289e7f0663770f8270794c93

  • SHA512

    df80fee6426f3bcc228414a32f9b7605da4a19c2eac1c36acfb7b3491c3a91abd7b9e7d84a16ab444b289621356b2d5dace574923b8f62f4e0828202a6cd8cd1

  • SSDEEP

    3072:KnHXMpxcGxFyhQ0bOqYJWd8qTkF9ec5KqqAgA4DdIxC+Gba9aEI:uHmGY/o0J0T0d5KYgSkS8

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      237KB

    • MD5

      a58d8465f840e1fcad4d41d738877384

    • SHA1

      9f4111ccada5d50048488955a35f27eccb2fd503

    • SHA256

      7946f8a23ac41d420ba85a4e71c108f586cec3b2e8b8a3448f5e4d19404d785f

    • SHA512

      8f30fd6128490effb87ca8831843eb7bc1b3a6e31fe0a989b35c1005d050e1b487124aebf21ffa38d2adceb48dfc7dc28835b5ff463a05f0db8c96a77ad5b405

    • SSDEEP

      3072:DBAp5XhKpN4eOyVTGfhEClj8jTk+0hT6IPEaG562E3nV9uVSUO2I+Cgw5CKHq:ubXE9OiTGfhEClq9gTuRJJUq

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks