General
-
Target
ece0ffad1087cd04e5e8ee17d5ebf104_JaffaCakes118
-
Size
79KB
-
Sample
240411-h7kraahf5y
-
MD5
ece0ffad1087cd04e5e8ee17d5ebf104
-
SHA1
419a8e8a69b074d2dfc492a991d5d66b5de0dc9e
-
SHA256
1d256912ca6569decd972173cc676c963b1dd60fd845941d1db355341d919da0
-
SHA512
654fbe128b457fd2a8351ce293fb79defaa598bdfc4c4b1620343f856afbd95984c50062412fe57ac34710bcb68a7c32a6fb9946facee8d7524eca510e76f96a
-
SSDEEP
1536:Tvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07t+vhAUqHRKKXPTKFnmq/MH5YEAk:TvgEL7Yo4PkH9sIbMpAxQKXP+Fr/MHN7
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
180KB
-
MD5
05dcabe4947ada380eb48cf90eb0aa6f
-
SHA1
d11c9319a518ddc14dc62cc138d074b1d908c924
-
SHA256
53b296ba46752bf57d298dfe5ba8b011574253199e57ffd8c8786bb16f642f49
-
SHA512
a336ca962fe97f329fa6968e2532096a0051e5f124c20c7ba74d6688e5b15b2f34980b56f2b6f1e5ff3a53a05936510f22841279497ca50061e5c3fc55ea1614
-
SSDEEP
3072:nBAp5XhKpN4eOyVTGfhEClj8jTk+0hJiH8ga2EPb9ePlO7/IQ1bvatjKv5sK2DdH:qbXE9OiTGfhEClq9j8ga2+b9ePlO7/IR
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-