General

  • Target

    4de40b3bd5d98c964327b45dd898f561

  • Size

    78KB

  • Sample

    231226-dbmhsabcal

  • MD5

    4de40b3bd5d98c964327b45dd898f561

  • SHA1

    c4c2d2d2a74c733cf59a7332e14baaa19ba17454

  • SHA256

    ff87f636d64c1ea9fbdf70b738363d4b2a28c553d04839f8e25e32ac79c1fe4a

  • SHA512

    1a8337394094997e348e0990043da3d5cbf8b70cc7f8082a1bae7800784a08633e072099c0c674eef8c9375d427df0dfdf71ecb2baa425c6349605cdb922a12f

  • SSDEEP

    1536:BQwfwimgTY23tG90wIsWfHlWKSd+QSqWU5FJ2hZ+cYS4BHKFJtBf9ntlsp0OT:Bnoimg13tG90HdQ3Sqtlm+VSFJ/lntlw

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      180KB

    • MD5

      2e7d20079b41b69b3b16ecbd895be189

    • SHA1

      c63b1f1a9ec96ca7b0fc0d92bc082593e1df85e0

    • SHA256

      8aac418dfae104c626385ba620705f3d8f83ad9753020474a7fd41db3e808fc6

    • SHA512

      ab1326e5b177a7d32f7d97c0d3efce235df0da4d2b2faf40528fe399e0adccb6e7c67c2aac07f15294be6c23f12b966c9fc3135d9b8f561e99f10a5ad98532e9

    • SSDEEP

      3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6eXmUS:+bXE9OiTGfhEClq9deXY

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks