General
-
Target
ab780f22844d959781a8e8d036670632
-
Size
99KB
-
Sample
240228-kkww5sfe77
-
MD5
ab780f22844d959781a8e8d036670632
-
SHA1
f733bf510cf1b81272c2a63b63cb0e308cfb9977
-
SHA256
077925ed7f616eef6658a4de65c01221afbc28e5970a91373a28d6c81a0f5f65
-
SHA512
96ab2ad41cb499465eb09a252f9ad713ac681372bdc82d6c4149cc4f0962ce6c3b7841522e7f0069950d5e2324a73293b31ec3c450bac116b75c1f1ff55796ff
-
SSDEEP
3072:V47excGxFLPkH9SnbZDaFqLxRntGr+2tItZYpz4PIsm:V+eGYtPk0Z+eaHyE54PIr
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
149KB
-
MD5
0196884e4ae0fc48c9bf5f8260502466
-
SHA1
40a78aeb8bcd7abd24088e1103ac3b292c30992a
-
SHA256
20621acdaf45c4cbcdeb972a78a8baca5cb0327489da84523c406a1e740ec7ab
-
SHA512
cb9a56c4c3415c955befeaedcf83e92fbe768e1bcef07d280f0c5a3f047bbc6f9dc58532c4562088ee44bd8ec69acba371e22f42b92319517bd4d1cb6a66a55f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHZYpz4PIsa:AbXE9OiTGfhEClq9k54PId
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-