General
-
Target
0ce9847fee18bcb614f675677dbeadff
-
Size
127KB
-
Sample
231224-x1nlxsacem
-
MD5
0ce9847fee18bcb614f675677dbeadff
-
SHA1
90cf508ad22c175753d54afaa9dadf31a585601b
-
SHA256
e1f435f0d22e3a9ccff14faacefe8a7b087cf0a0bbaedf3d8cb5036f2feeaf49
-
SHA512
84740e8de785a498fcb1a0495449ae35ca6719e47eb43e1fd390583e12d37a6280ce1bbd642958d24a36d9959ee95e6cc0cb2134b939a9d1861f7a3809132387
-
SSDEEP
3072:5vgEL7Yo4PkH9sIb8WlJc2rftwh8lupNcnSXWje7sI+a7yS:5vgEPYo4Pktlq2rbluTcn4WRaWS
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
238KB
-
MD5
43fe764bb0d948ccae24fcbd8ac7c17e
-
SHA1
5f787deaec858095f6894f892b71b7e03a05d106
-
SHA256
f5c517c991353a148cea7f08bdb6e9eb34abc7e2fe98e25ae99dbd9f9a951aff
-
SHA512
e985b9f2bc813d66f2cd2a3b5e31a5dbf9e23f8046719e39657acd8b50554f6de2dce104d78ca5436a007c157bb4cc60d0c6355df9748271be5cfddfc2178b0d
-
SSDEEP
3072:jBAp5XhKpN4eOyVTGfhEClj8jTk+0hsquxV/hvdG+Cgw5CKHm:ObXE9OiTGfhEClq9XqK/hvxJJUm
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-