General
-
Target
1f6e19c975cf199298ca56f49d23f618
-
Size
99KB
-
Sample
231225-pyvy8adffq
-
MD5
1f6e19c975cf199298ca56f49d23f618
-
SHA1
f4914379111c1b4654033645a9f6790c977d87b9
-
SHA256
e2f0dfd97e1cb9c92d37cbd5258585114f1ea5997352a7c3f9b798a7d11bb4dd
-
SHA512
816f3f08068ae8df197e5967293d5dcb9bd38fce0594c7564d8e5a414043a94c6006bce65915eddedbabd3e049406716de679b8574b6ced2c4a65fadb98123dd
-
SSDEEP
3072:347excGxFLPkH9SnbZDazo21mLtQqVI+8iXL:3+eGYtPk0Z+zo6JDiXL
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-