General
-
Target
bfb6579b1cd449505bcc528d9bfa6aca
-
Size
91KB
-
Sample
240311-dxl45sbd6s
-
MD5
bfb6579b1cd449505bcc528d9bfa6aca
-
SHA1
75b1cac41b680ae7c75d7b5e6ef4a81824f1dd9f
-
SHA256
48ab408b6f9853729242ca5a0dd45ecba6a08e0938eae8915ea53c5a81caf995
-
SHA512
778a87b3319e804ef9cbb7dbf5146d44dac604ac2bc194aff850ed10f4fda2297fc4b674624093e69fb70bc09164b56380dca8955f4712d2de48f0ae8cd76a95
-
SSDEEP
1536:yUnVN5HOHUEs6iqcuyIJ4fnb07w3317NIf8n5zBWOurXjBCl9b2WGA+ZetAoSaCP:yUnLYCq/Fufnb07YO86X7jcl8WMtaCP
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
180KB
-
MD5
0807cdca2c7e165f7b0a11e4c9c1e782
-
SHA1
8e0238ff51d78cdbaf8df22983f98a60e5600ac9
-
SHA256
39e6435fa4030a9252678a3fb31b7a76dddd85e1a1dcfb5446fe0907a8918dc2
-
SHA512
1ebaf822e01e7f19f0af134cbedfc8d738f36f0fc89419bf0c46ff0d2002aafdd314074f42f0dbdaa67a92614ff1438480087958c4e9c6dc5e553bf8c98a5f2d
-
SSDEEP
3072:kBAp5XhKpN4eOyVTGfhEClj8jTk+0hkflw/doa/kW1uTJ:zbXE9OiTGfhEClq9FfqoacWETJ
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-