General
-
Target
56a5bca1a2cc530d10f9798a1d8098c2
-
Size
116KB
-
Sample
240112-q97ylahcbr
-
MD5
56a5bca1a2cc530d10f9798a1d8098c2
-
SHA1
f8a8f9c86e59e5b3828f786e22140c86d01e612c
-
SHA256
2d82d6c196bec4ccdddb610d4945f934cbc3583b7b2742ecfdb496f4aa24ba42
-
SHA512
966ca8b107884fc698535b00035c4157a7eadd2a5f75cdf90a87978e3dcd985625d27654eace20848b50e8c50ce7cd0ff6dc9c40eef966357801569d9202fc0b
-
SSDEEP
3072:2l0img13tG90HdQ3Sqt1k4e7iAJjU+hLMDgs2z4kF7fKz:2ljpD9Q3Tt1Le7iAVU+ODX2z4vz
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
239KB
-
MD5
9ea5d4e300dd6c096812711fa3c677d2
-
SHA1
91ae3f2c828d65fc1d862abda77c875a433a09f8
-
SHA256
fa673f26eca0e92ae23fd52290a15fed2115c3cce647c93a9d52a069d3f82aaa
-
SHA512
807886572612c5593192318f2ac65fc0d42a77989ac86ccfd730b9544f5fb14fb4aa54aa10bbc7c0f76cde779149da8662d5abba173a503fd942f9669985949e
-
SSDEEP
3072:7BAp5XhKpN4eOyVTGfhEClj8jTk+0hWmKlv+Cgw5CKHK:mbXE9OiTGfhEClq9PTQJJUK
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-