General
-
Target
baf94ab3cdd7e6491372dce5e06ac58f
-
Size
99KB
-
Sample
240308-l2f3pacc44
-
MD5
baf94ab3cdd7e6491372dce5e06ac58f
-
SHA1
42b393a2e6a5cfa84d04c6bc57cf731ebf5553cf
-
SHA256
aa81c308bb51e653275687982864151bccb665eee3b4c146ab70ee6d1061048e
-
SHA512
2ed14ce8192ccb48f6d4b234e8b618a3ebdd81ce70cd5c52530d0882d47b5ea06ec0b66f3bc3ca0638ad5032b57ac3d49f44238e460d415e3803eff61485eb78
-
SSDEEP
3072:U47excGxFLPkH9SnbZDaWoN093t1pPXWHh:U+eGYtPk0Z+b29FPWHh
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
e9fd8bdc0bde7fcfe125365a38eea21b
-
SHA1
ef854a798f094d378dbcbb8fc9c6875dc6b9390b
-
SHA256
bcf7de87a7e8e1febba170298c2584377879146cb8f89d36f152c7ff96246f5f
-
SHA512
32f4993b48436d6ee6d5c0f427fe83bbca5df270804450326a74e518fa7f0b88b22a4ff06c32cf94bb1fa70709ded787a87ce10f6cef9f1a82c858427ba017a4
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHoaPXWH8:AbXE9OiTGfhEClq9aaPWH8
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-