General

  • Target

    79ac30da37f00796e938596034675625

  • Size

    127KB

  • Sample

    231226-s45mdsfea5

  • MD5

    79ac30da37f00796e938596034675625

  • SHA1

    4c859c5a8a2ddd0466f59c187c4564027df9f0f7

  • SHA256

    784273d91e1664310f47ff05090f453284a56bbae7527cfa98e3e24fe2d7ce28

  • SHA512

    3f048edb5acc2322121c714c08ffe9ab42a5c7d52d5c72580592e8872bdee806fa954cb94459aca96d4f07a347c0661104c01029c1e74a1c21f651b5d5cb10bc

  • SSDEEP

    3072:uvgEL7Yo4PkH9sIb8WlJc2rftwh8lupNcnSXWje7sI+a7yg:uvgEPYo4Pktlq2rbluTcn4WRaWg

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      238KB

    • MD5

      43fe764bb0d948ccae24fcbd8ac7c17e

    • SHA1

      5f787deaec858095f6894f892b71b7e03a05d106

    • SHA256

      f5c517c991353a148cea7f08bdb6e9eb34abc7e2fe98e25ae99dbd9f9a951aff

    • SHA512

      e985b9f2bc813d66f2cd2a3b5e31a5dbf9e23f8046719e39657acd8b50554f6de2dce104d78ca5436a007c157bb4cc60d0c6355df9748271be5cfddfc2178b0d

    • SSDEEP

      3072:jBAp5XhKpN4eOyVTGfhEClj8jTk+0hsquxV/hvdG+Cgw5CKHm:ObXE9OiTGfhEClq9XqK/hvxJJUm

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks