General

  • Target

    2ba83d14de18a0fc6d81410b8cbc8337

  • Size

    89KB

  • Sample

    231225-tjgv9secd7

  • MD5

    2ba83d14de18a0fc6d81410b8cbc8337

  • SHA1

    d8959b6c8dfd8a0d801a7f7c463a64cdc7fb89a6

  • SHA256

    a3fac96d6f7bebab47d5b436cdc78e15c199bf1971abd50946e0514f5cd17a08

  • SHA512

    e605fcfe88d3d8b099bb28c82ecdd1d9b97ee3ef727b283e6f7022818dd2bd6420e392d0f8a2f71f702662c894d2543a8422e1477e4bc15e32469e46cf78d5c5

  • SSDEEP

    1536:0vg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5j:0vgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMM

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      180KB

    • MD5

      b5bfc25ec5d0d2576975e6df14cee8f2

    • SHA1

      ff48876248f0f0ff668aa7d67e2243bd9a3fd465

    • SHA256

      e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748

    • SHA512

      aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f

    • SSDEEP

      3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks