General
-
Target
72c41702b7e66ef7f274bdca45112c7ac1234a2aaf2bc195f81fe0b812e58969
-
Size
128KB
-
Sample
220919-cflavaffek
-
MD5
c6bd7bad97efea68d1543591404cdb7d
-
SHA1
a917b0d63c1da6856329af75835aa6b462c8c675
-
SHA256
72c41702b7e66ef7f274bdca45112c7ac1234a2aaf2bc195f81fe0b812e58969
-
SHA512
4cce00d804ab574772b22decdabe694e04cccf851ae2dd2484788c7285b2704d8802ca201c2e77689ee9064a01be25fe53312cd8be61850782c5e368b2b1d4d8
-
SSDEEP
3072:onHXMpxcGxFyhQ0bOqYoxIcEWubRRWIhQ/WD5K969+o:AHmGY/o0o+hBbR5hQODo96Io
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
239KB
-
MD5
759cb81096a6fde1b9ede08255248159
-
SHA1
cff5496d52b61098a04251c050c6e04b5ad13178
-
SHA256
9a00a517d51a4750fefc9fa7bb471a7ab9de1fbaf3d37ade6442682987a628a9
-
SHA512
8c44879a5a58addae21e521a87b5a3c6a466abb71dfc7e3db3026331f6b49cbbc27df4fc8f9e74cfcc1e69e64660bfd5cb3a0bf7096e48a385b9fa9df06c3794
-
SSDEEP
3072:QBAp5XhKpN4eOyVTGfhEClj8jTk+0hijkEDboYxU044U/1K+Cgw5CKHy:HbXE9OiTGfhEClq9YEXoyDjURJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-