General
-
Target
4de40b3bd5d98c964327b45dd898f561
-
Size
78KB
-
Sample
231226-dbmhsabcal
-
MD5
4de40b3bd5d98c964327b45dd898f561
-
SHA1
c4c2d2d2a74c733cf59a7332e14baaa19ba17454
-
SHA256
ff87f636d64c1ea9fbdf70b738363d4b2a28c553d04839f8e25e32ac79c1fe4a
-
SHA512
1a8337394094997e348e0990043da3d5cbf8b70cc7f8082a1bae7800784a08633e072099c0c674eef8c9375d427df0dfdf71ecb2baa425c6349605cdb922a12f
-
SSDEEP
1536:BQwfwimgTY23tG90wIsWfHlWKSd+QSqWU5FJ2hZ+cYS4BHKFJtBf9ntlsp0OT:Bnoimg13tG90HdQ3Sqtlm+VSFJ/lntlw
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
180KB
-
MD5
2e7d20079b41b69b3b16ecbd895be189
-
SHA1
c63b1f1a9ec96ca7b0fc0d92bc082593e1df85e0
-
SHA256
8aac418dfae104c626385ba620705f3d8f83ad9753020474a7fd41db3e808fc6
-
SHA512
ab1326e5b177a7d32f7d97c0d3efce235df0da4d2b2faf40528fe399e0adccb6e7c67c2aac07f15294be6c23f12b966c9fc3135d9b8f561e99f10a5ad98532e9
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6eXmUS:+bXE9OiTGfhEClq9deXY
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-