General

  • Target

    3e1566a7742251e823facdb6db1959bb

  • Size

    79KB

  • Sample

    231225-1kd94agcf6

  • MD5

    3e1566a7742251e823facdb6db1959bb

  • SHA1

    055d82ec02044511658fbf7187dc0aff9a0462fc

  • SHA256

    5eb737e4fc67cc7ff4df717377cd6f68bfeae0fac6b8464370544b476098762f

  • SHA512

    454b02a80091c3dd761981926e6027dd9de194638cfa787068b2ae2d4c96b0a24a0fec8334bc7974b7e78535b9f757df0614f2188b668aaa10a4ad8797b6b12a

  • SSDEEP

    1536:vvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07t+vhAUqHRKKXPTKFnmq/MH5YEAY:vvgEL7Yo4PkH9sIbMpAxQKXP+Fr/MHNX

Score
8/10

Malware Config

Targets

    • Target

      RUSSKAYA-GOLAYA.exe

    • Size

      180KB

    • MD5

      05dcabe4947ada380eb48cf90eb0aa6f

    • SHA1

      d11c9319a518ddc14dc62cc138d074b1d908c924

    • SHA256

      53b296ba46752bf57d298dfe5ba8b011574253199e57ffd8c8786bb16f642f49

    • SHA512

      a336ca962fe97f329fa6968e2532096a0051e5f124c20c7ba74d6688e5b15b2f34980b56f2b6f1e5ff3a53a05936510f22841279497ca50061e5c3fc55ea1614

    • SSDEEP

      3072:nBAp5XhKpN4eOyVTGfhEClj8jTk+0hJiH8ga2EPb9ePlO7/IQ1bvatjKv5sK2DdH:qbXE9OiTGfhEClq9j8ga2+b9ePlO7/IR

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

MITRE ATT&CK Enterprise v15

Tasks