General

  • Target

    0ce9847fee18bcb614f675677dbeadff

  • Size

    127KB

  • Sample

    231224-x1nlxsacem

  • MD5

    0ce9847fee18bcb614f675677dbeadff

  • SHA1

    90cf508ad22c175753d54afaa9dadf31a585601b

  • SHA256

    e1f435f0d22e3a9ccff14faacefe8a7b087cf0a0bbaedf3d8cb5036f2feeaf49

  • SHA512

    84740e8de785a498fcb1a0495449ae35ca6719e47eb43e1fd390583e12d37a6280ce1bbd642958d24a36d9959ee95e6cc0cb2134b939a9d1861f7a3809132387

  • SSDEEP

    3072:5vgEL7Yo4PkH9sIb8WlJc2rftwh8lupNcnSXWje7sI+a7yS:5vgEPYo4Pktlq2rbluTcn4WRaWS

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      238KB

    • MD5

      43fe764bb0d948ccae24fcbd8ac7c17e

    • SHA1

      5f787deaec858095f6894f892b71b7e03a05d106

    • SHA256

      f5c517c991353a148cea7f08bdb6e9eb34abc7e2fe98e25ae99dbd9f9a951aff

    • SHA512

      e985b9f2bc813d66f2cd2a3b5e31a5dbf9e23f8046719e39657acd8b50554f6de2dce104d78ca5436a007c157bb4cc60d0c6355df9748271be5cfddfc2178b0d

    • SSDEEP

      3072:jBAp5XhKpN4eOyVTGfhEClj8jTk+0hsquxV/hvdG+Cgw5CKHm:ObXE9OiTGfhEClq9XqK/hvxJJUm

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks