General
-
Target
3e1566a7742251e823facdb6db1959bb
-
Size
79KB
-
Sample
231225-1kd94agcf6
-
MD5
3e1566a7742251e823facdb6db1959bb
-
SHA1
055d82ec02044511658fbf7187dc0aff9a0462fc
-
SHA256
5eb737e4fc67cc7ff4df717377cd6f68bfeae0fac6b8464370544b476098762f
-
SHA512
454b02a80091c3dd761981926e6027dd9de194638cfa787068b2ae2d4c96b0a24a0fec8334bc7974b7e78535b9f757df0614f2188b668aaa10a4ad8797b6b12a
-
SSDEEP
1536:vvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07t+vhAUqHRKKXPTKFnmq/MH5YEAY:vvgEL7Yo4PkH9sIbMpAxQKXP+Fr/MHNX
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
180KB
-
MD5
05dcabe4947ada380eb48cf90eb0aa6f
-
SHA1
d11c9319a518ddc14dc62cc138d074b1d908c924
-
SHA256
53b296ba46752bf57d298dfe5ba8b011574253199e57ffd8c8786bb16f642f49
-
SHA512
a336ca962fe97f329fa6968e2532096a0051e5f124c20c7ba74d6688e5b15b2f34980b56f2b6f1e5ff3a53a05936510f22841279497ca50061e5c3fc55ea1614
-
SSDEEP
3072:nBAp5XhKpN4eOyVTGfhEClj8jTk+0hJiH8ga2EPb9ePlO7/IQ1bvatjKv5sK2DdH:qbXE9OiTGfhEClq9j8ga2+b9ePlO7/IR
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-