General
-
Target
a46ffa49361d25b4dd8f7999316589b7d4acb6c6a5de17741cd2669f2205a421
-
Size
122KB
-
Sample
220919-re37lacbe3
-
MD5
3d111117ab9afde2dfd2cfbce91df38f
-
SHA1
69ba740fd090c71b9c753841060e6a01be88bb07
-
SHA256
a46ffa49361d25b4dd8f7999316589b7d4acb6c6a5de17741cd2669f2205a421
-
SHA512
b1e6301d2764fbe401b42c9e7f00229f9c16878c1fbdd5dc4ab2d3380b0355dd05e3920c0f6b43bbb8f1bd1919c08100fbdd7e090d283a068d6b510fccae355d
-
SSDEEP
3072:NnHXMpxcGxFyhQ0bOqYhGO1PgN7Hn9LeXrfit3R6jyTZ6WxL:RHmGY/o0hGO2JdL2I3cXWxL
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
238KB
-
MD5
4bf7fbae5d85b68dba3a92e172504238
-
SHA1
641a659c755e3adafa971a3f32c6e47b4f5f1173
-
SHA256
2e8efaea895111c02f1efddb99fa07fdd1e9c2318d488ae6c9b27064f6c0feac
-
SHA512
93e67706c4d5ffd05de586f612c8af211630921e2b91b5ec488a734fa951835caab543da76160f21bec8160473017857bcdd5625440a9247279986d05468e96d
-
SSDEEP
6144:zbXE9OiTGfhEClq9dqCvR/w/3E616xKJJUm:/U9XiuiURI/ss
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-