General

  • Target

    8e4ba3c80cc95421dfccf98c4455fe1e

  • Size

    91KB

  • Sample

    240204-fvheaaabd2

  • MD5

    8e4ba3c80cc95421dfccf98c4455fe1e

  • SHA1

    be99aa813bfc687f972ab1350ea18479c287c2dc

  • SHA256

    d50ab99b54195c7a8f87d7fd90b7a82eb126d7978f4301ed650f9a083a50b421

  • SHA512

    fc7a8eb7b650e2853123b6e7f227674efe2876a3ed73521d188f73bbe1538387b925b641bc1980c0f1e2a6110ad48b28ac0e22185e605781ddbe7de2dd73c05a

  • SSDEEP

    1536:kUnVN5HOHUEs6iqcuyIJ4fnb07w3317NIf8n5zBWOurXjBCl9b2WGA+ZetAoSaCW:kUnLYCq/Fufnb07YO86X7jcl8WMtaCW

Score
8/10

Malware Config

Targets

    • Target

      RUSSKAYA-GOLAYA.exe

    • Size

      180KB

    • MD5

      0807cdca2c7e165f7b0a11e4c9c1e782

    • SHA1

      8e0238ff51d78cdbaf8df22983f98a60e5600ac9

    • SHA256

      39e6435fa4030a9252678a3fb31b7a76dddd85e1a1dcfb5446fe0907a8918dc2

    • SHA512

      1ebaf822e01e7f19f0af134cbedfc8d738f36f0fc89419bf0c46ff0d2002aafdd314074f42f0dbdaa67a92614ff1438480087958c4e9c6dc5e553bf8c98a5f2d

    • SSDEEP

      3072:kBAp5XhKpN4eOyVTGfhEClj8jTk+0hkflw/doa/kW1uTJ:zbXE9OiTGfhEClq9FfqoacWETJ

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks