General

  • Target

    1f6e19c975cf199298ca56f49d23f618

  • Size

    99KB

  • Sample

    231225-pyvy8adffq

  • MD5

    1f6e19c975cf199298ca56f49d23f618

  • SHA1

    f4914379111c1b4654033645a9f6790c977d87b9

  • SHA256

    e2f0dfd97e1cb9c92d37cbd5258585114f1ea5997352a7c3f9b798a7d11bb4dd

  • SHA512

    816f3f08068ae8df197e5967293d5dcb9bd38fce0594c7564d8e5a414043a94c6006bce65915eddedbabd3e049406716de679b8574b6ced2c4a65fadb98123dd

  • SSDEEP

    3072:347excGxFLPkH9SnbZDazo21mLtQqVI+8iXL:3+eGYtPk0Z+zo6JDiXL

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      149KB

    • MD5

      e1fb70408c7945c6524c321063bd9570

    • SHA1

      ebcd6a63fac9609c46e9c84708aa1e5701ee7775

    • SHA256

      3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed

    • SHA512

      58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814

    • SSDEEP

      3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks