General

  • Target

    1124d5f6825e92e77793b0a2acb1a0bc

  • Size

    110KB

  • Sample

    231230-halx3schbq

  • MD5

    1124d5f6825e92e77793b0a2acb1a0bc

  • SHA1

    a106765d95a7929c3c3e4d3f2ac65eeeb92f2b7f

  • SHA256

    a64bcce861bc1386947c43fa03193ca5a0212934d53c69d0158940abe7a69755

  • SHA512

    8e0246d5e18f0c625370152eff602a6b2effd56f7f51c4384dc121b9d70af70db25fa06dbca4fe5b7a53882c78c5cd926d6e03e9f9c89a97f4e7d2dd176e1d51

  • SSDEEP

    3072:yrz/BRgd7NTpAb+ratuADH3YckoIrDgEmo:yP/BRgV33atjTkogDV

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-DEVOCHKA.exe

    • Size

      238KB

    • MD5

      1414a0cf3ae3455f7445753aa9ef0ac9

    • SHA1

      c6e63022a267155926638e028ba0bfafe614ff15

    • SHA256

      2acd2fd6a3fbb4fe40a62ba571ed6015fdbec4a0a6aec9ccde3f33cbc803fee7

    • SHA512

      939e9f2dca756893d04a1619537ee7e71c7eda27ebf9785b16fe0e892327ba23d2bbc54d82b97e590d803ce01d89087eaf24b330572aa5ba14c0668d9faf29b0

    • SSDEEP

      6144:zbXE9OiTGfhEClq9rZXpdKw/F4qweYG3/jk8hqfFyBgRY7JJUm:/U9XiuiI

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks