General
-
Target
03d9d749fd11a708ca82386cb6bd6e98
-
Size
100KB
-
Sample
231229-zs4z2scga3
-
MD5
03d9d749fd11a708ca82386cb6bd6e98
-
SHA1
468b434689d1eac38d309f07287f4b13bca84459
-
SHA256
97f3d4e41a4e894bdd586cf96234740770bdcaf667c1f11973d46e94e7832dde
-
SHA512
b2379696a8d94191dcb04fd7a6f3040249ed14331f3727dad1e0c4b819ce513fec8e8076729de856c767a96738925e40c073704e640271bf1d2aa916bdd1e459
-
SSDEEP
3072:p47excGxFLPkH9SnbZDa7Ru8ltieVbZWxgIfZ:p+eGYtPk0Z+7RogIx
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
150KB
-
MD5
9fcb47ec7908b46b029001a8f34a7b71
-
SHA1
a7c56e81bbea0611d6207aceb9f9a9278cdbb1fa
-
SHA256
11230d56b431972ce4366660080af1cefc2443073ad089797ffa1d6e0ce6be80
-
SHA512
88e93b71e286808593b45cfe937d63cdff6b34cdd89d24bc6e09e0ac8428f4645d627db79e4f8d134b44450e6cae9a38ee5db5f239519692fb637e2a416d4b38
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hirzE2/gIfr:AbXE9OiTGfhEClq9dbgIz
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-