General
-
Target
85d1d5b72e57e4c70f779d072ad10d55d1d6ac1d5c6ecd9859bd719ec7df9722
-
Size
128KB
-
Sample
220919-jl4spsefh2
-
MD5
461e98f1264c1e41eea12e8e3eee1c9d
-
SHA1
d2e3a40f712a26cff15505bf41bc9f89b5205795
-
SHA256
85d1d5b72e57e4c70f779d072ad10d55d1d6ac1d5c6ecd9859bd719ec7df9722
-
SHA512
6e1508cb4861e5b5b676177ef52b53e29ccac2d328cdf541065d13b8ab124cc6ec6d540e769c8bd30af414941e8d4e10f48351a5ed003d70845618b24f4a4b53
-
SSDEEP
3072:NpmgI3tG90HdQ3SqtHwamSx3F7IlyEyB0DPu+JIrVQd:3aD9Q3TtHwamly8PuCIS
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
240KB
-
MD5
934d29283079d878fae23838ff5d156b
-
SHA1
773c0ba664625a4030af3b8ea321de5ee0e029c6
-
SHA256
fe9d78c0c394e248da57fc5693fe5cb0a759489c93ae300adef582f1069413c6
-
SHA512
d410f0196092ad17a00496a587cd135e610efd6af47091731be9040d9426e2d24641e5989dc753d4e9d7ba3f126f8f2ce467f006c303a659cfb8495c8c119fc2
-
SSDEEP
3072:4BAp5XhKpN4eOyVTGfhEClj8jTk+0hnbGsthRX1Tr+Cgw5CKHe:vbXE9OiTGfhEClq9uLhjyJJUe
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-