General

  • Target

    b5d9d0dc405d126b7b71d5147f42feb3

  • Size

    91KB

  • Sample

    240305-2qskcabf5t

  • MD5

    b5d9d0dc405d126b7b71d5147f42feb3

  • SHA1

    0731301d420a43b58a16a12e88724ef64f36c0f3

  • SHA256

    81dedadb1225261542e030276ced9bc76f767eb7667464b7b986884aa8ebf49b

  • SHA512

    6990f7f56d05713aaacd8f449bd6c57324315894f002be9cc0dba37e56a1601723264e2d2fc565bcf812176c57e37c363171dbbfe0bac2a7dc88fcd237c7c6d4

  • SSDEEP

    1536:UQwHfvMS0xcGxFyhQkrnb1Mq9WbJOnMA+txGFCr6cXp4xkPdh2B3SeyG:UnHXMpxcGxFyhQ0bOqYuc6c7P6cG

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      180KB

    • MD5

      b5a44c060c6c4a2d439f9906574a0073

    • SHA1

      89db03d3f47080cca01ebc298f8c989a6b13d3ff

    • SHA256

      d1e011fc69e871b93db9de9f90422097fd88f220ecf664be1d718d2d25fc1c33

    • SHA512

      26b09dc50fe71874c3a96c9434d82681a7ceb588869a5a6e070f5d77daea912d82350745ffd1ecc2fb59c56598fcd15289598cdfca3ddbd6ea416eaf8bb6ae88

    • SSDEEP

      3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuI0m7:1bXE9OiTGfhEClq9dYpI0M

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks