General
-
Target
5905ec568cef3acffe4a2a315dcaab6d94b2c2e9726d81cecc54b65f497261f2
-
Size
131KB
-
Sample
221205-3hy8labd7s
-
MD5
d20b5314a6ca0f1bada3327e794e8ec2
-
SHA1
9783840b2c5d3982b5c50a81ca4c29832de9d10a
-
SHA256
5905ec568cef3acffe4a2a315dcaab6d94b2c2e9726d81cecc54b65f497261f2
-
SHA512
aaa65c684a8eb713f8fd1adf9cd9be16a3e28aac0a8aa80623021533a19239e2aac09d9b60f1785c04fee375b6550285e754f12f6bca241183b2a65bb5679c92
-
SSDEEP
3072:hnHXMpxcGxFyhQ0bOqYW6Qn6RuhCmICnACTIUAf9QnwhmHJ:tHmGY/o0W6Q6R8CsnVTI4wh+J
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
238KB
-
MD5
7710fc4fcea932679b40d31d409ae117
-
SHA1
bb5dfd38943356d6c1cff6b12d32f1cb54af6d35
-
SHA256
11abaf6a3b196588408e4d7fe8bf9a7d9b1a9b9bb3eeeb3dc2215be38f18eefa
-
SHA512
7fb1e792e8d2533a5aa4927971249d59f25fe2fe7067b9a1dbbb71aa1a5964bd7efb75822c73ffdef9ff118982e42b870c883229fa37eee228f3d11026574b06
-
SSDEEP
6144:MbXE9OiTGfhEClq9528TfdRoWRg+lN/JJUm:oU9XiuiJ8DRxl5
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-