General
-
Target
2ba83d14de18a0fc6d81410b8cbc8337
-
Size
89KB
-
Sample
231225-tjgv9secd7
-
MD5
2ba83d14de18a0fc6d81410b8cbc8337
-
SHA1
d8959b6c8dfd8a0d801a7f7c463a64cdc7fb89a6
-
SHA256
a3fac96d6f7bebab47d5b436cdc78e15c199bf1971abd50946e0514f5cd17a08
-
SHA512
e605fcfe88d3d8b099bb28c82ecdd1d9b97ee3ef727b283e6f7022818dd2bd6420e392d0f8a2f71f702662c894d2543a8422e1477e4bc15e32469e46cf78d5c5
-
SSDEEP
1536:0vg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5j:0vgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMM
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
180KB
-
MD5
b5bfc25ec5d0d2576975e6df14cee8f2
-
SHA1
ff48876248f0f0ff668aa7d67e2243bd9a3fd465
-
SHA256
e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748
-
SHA512
aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f
-
SSDEEP
3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-