General
-
Target
79ac30da37f00796e938596034675625
-
Size
127KB
-
Sample
231226-s45mdsfea5
-
MD5
79ac30da37f00796e938596034675625
-
SHA1
4c859c5a8a2ddd0466f59c187c4564027df9f0f7
-
SHA256
784273d91e1664310f47ff05090f453284a56bbae7527cfa98e3e24fe2d7ce28
-
SHA512
3f048edb5acc2322121c714c08ffe9ab42a5c7d52d5c72580592e8872bdee806fa954cb94459aca96d4f07a347c0661104c01029c1e74a1c21f651b5d5cb10bc
-
SSDEEP
3072:uvgEL7Yo4PkH9sIb8WlJc2rftwh8lupNcnSXWje7sI+a7yg:uvgEPYo4Pktlq2rbluTcn4WRaWg
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
238KB
-
MD5
43fe764bb0d948ccae24fcbd8ac7c17e
-
SHA1
5f787deaec858095f6894f892b71b7e03a05d106
-
SHA256
f5c517c991353a148cea7f08bdb6e9eb34abc7e2fe98e25ae99dbd9f9a951aff
-
SHA512
e985b9f2bc813d66f2cd2a3b5e31a5dbf9e23f8046719e39657acd8b50554f6de2dce104d78ca5436a007c157bb4cc60d0c6355df9748271be5cfddfc2178b0d
-
SSDEEP
3072:jBAp5XhKpN4eOyVTGfhEClj8jTk+0hsquxV/hvdG+Cgw5CKHm:ObXE9OiTGfhEClq9XqK/hvxJJUm
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-