General
-
Target
b5d9d0dc405d126b7b71d5147f42feb3
-
Size
91KB
-
Sample
240305-2qskcabf5t
-
MD5
b5d9d0dc405d126b7b71d5147f42feb3
-
SHA1
0731301d420a43b58a16a12e88724ef64f36c0f3
-
SHA256
81dedadb1225261542e030276ced9bc76f767eb7667464b7b986884aa8ebf49b
-
SHA512
6990f7f56d05713aaacd8f449bd6c57324315894f002be9cc0dba37e56a1601723264e2d2fc565bcf812176c57e37c363171dbbfe0bac2a7dc88fcd237c7c6d4
-
SSDEEP
1536:UQwHfvMS0xcGxFyhQkrnb1Mq9WbJOnMA+txGFCr6cXp4xkPdh2B3SeyG:UnHXMpxcGxFyhQ0bOqYuc6c7P6cG
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
180KB
-
MD5
b5a44c060c6c4a2d439f9906574a0073
-
SHA1
89db03d3f47080cca01ebc298f8c989a6b13d3ff
-
SHA256
d1e011fc69e871b93db9de9f90422097fd88f220ecf664be1d718d2d25fc1c33
-
SHA512
26b09dc50fe71874c3a96c9434d82681a7ceb588869a5a6e070f5d77daea912d82350745ffd1ecc2fb59c56598fcd15289598cdfca3ddbd6ea416eaf8bb6ae88
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuI0m7:1bXE9OiTGfhEClq9dYpI0M
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-