General
-
Target
f617c9547ee89883fd6694d31d0b7a52_JaffaCakes118
-
Size
122KB
-
Sample
240417-swy5msdh97
-
MD5
f617c9547ee89883fd6694d31d0b7a52
-
SHA1
48ddfcfb451ee2ade25472179ba9ac93655f6574
-
SHA256
28ccdc782b4710a937d3b3bb108803e41117a5110b0329c659dae02f3ce72aa1
-
SHA512
fd1ec5907bd807c7b98bd7b4c6b5f7acc40135fe5bb76fb7224edd4e890ecc4b48898a08d5fe8b756c4ec2e0bb1a736efdfd0ebcbd6979a0b057c813da78a984
-
SSDEEP
3072:GnHXMpxcGxFyhQ0bOqYhGO1PgN7Hn9LeXrfit3R6jyTZ6WxE:iHmGY/o0hGO2JdL2I3cXWxE
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
238KB
-
MD5
4bf7fbae5d85b68dba3a92e172504238
-
SHA1
641a659c755e3adafa971a3f32c6e47b4f5f1173
-
SHA256
2e8efaea895111c02f1efddb99fa07fdd1e9c2318d488ae6c9b27064f6c0feac
-
SHA512
93e67706c4d5ffd05de586f612c8af211630921e2b91b5ec488a734fa951835caab543da76160f21bec8160473017857bcdd5625440a9247279986d05468e96d
-
SSDEEP
6144:zbXE9OiTGfhEClq9dqCvR/w/3E616xKJJUm:/U9XiuiURI/ss
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-