Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
General
-
Target
1eb4101157a99d2eb51bf5ab02b01c37
-
Size
80KB
-
MD5
1eb4101157a99d2eb51bf5ab02b01c37
-
SHA1
0eaa19c0f72d357f050654fd946a89950d5e47d1
-
SHA256
aa0aed8d4f16e944602767dd256a2a9818801ca72618232dc5a98c0a96d3beb3
-
SHA512
03c782a872e9daf4bc84c1fa377dc2de5e47eb82cf894717ba36e89e9abe287fac2a538a8dd29e25a8816661a0ba992074b8d10b8f9c839ccb9bdfa80e082f09
-
SSDEEP
1536:kQWQFGFI/PvgCRN59/iWfGXnXn8j5oWKg7LB5Eux3txe7:brz/BRgW2nIoz+d5EuLxG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/GOLAYA-RUSSKAYA.exe
Files
-
1eb4101157a99d2eb51bf5ab02b01c37.zip
-
GOLAYA-RUSSKAYA.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ