General
-
Target
f4231ce74e26feef5a28c4dd42cea140984497e65732534c22c979f48b49513f
-
Size
114KB
-
Sample
221203-1w4zwshd38
-
MD5
62b4d6e05273647bc460e81a13b4b23e
-
SHA1
5e5616576eedf0e7becb7059654e28b68190c7f8
-
SHA256
f4231ce74e26feef5a28c4dd42cea140984497e65732534c22c979f48b49513f
-
SHA512
6fe612b3423303f0ab71de0005ce3db2812453bbbfb5515fb746e68d444897ed242ba493e8d62d952962feda6a63f259b1420cf28468fb8282ca939d8ee9406e
-
SSDEEP
3072:Vl0img13tG90HdQ3Sqt7PyhbqpfQMJFPhbseoauN7EJ/0wa2y:VljpD9Q3Tt7PyVcpH5uVK/0Gy
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
238KB
-
MD5
84fafce88584c5a871cb0d784945d456
-
SHA1
fd2c40c816e253420db99f2c15a734c3a89339cf
-
SHA256
2e44d43ddac23374417e7dfafab8e773dd0424ae2632a559c601a6f4aa860395
-
SHA512
371cd44fb4fc9d1b4b90802fddf0cf06169cdd02a4627651f46d7ef6eb51ce7b30a9c21d22f11a0637a8c09263d1cbe394fb6f879d4d72ceb56823385e94ba98
-
SSDEEP
3072:pBAp5XhKpN4eOyVTGfhEClj8jTk+0hUy8FlDS+Cgw5CKHm:sbXE9OiTGfhEClq9v1jJJUm
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-