General
-
Target
b8fbf163b6bd56aaefcb3e10ea0b6332be98ed4a504c9fc743928774d4755bac
-
Size
99KB
-
Sample
220919-wezlmaehfn
-
MD5
ec1b0dfc0c682f3fdeb3fc814786bbfe
-
SHA1
a2e4e8ed9a913ff335b2674037d1f998a3fe9bb8
-
SHA256
b8fbf163b6bd56aaefcb3e10ea0b6332be98ed4a504c9fc743928774d4755bac
-
SHA512
6076ba3f8eaaf2efa9ed5151b21e7a4e67c6a40645e1dd263d2390d438f6f9248ce098edbd15c91aaf36de157d2a684032a3d59fffbc53109e3bb8feaa493132
-
SSDEEP
3072:447excGxFLPkH9SnbZDaHjS+zFD8ZIde/2GP+:4+eGYtPk0Z+HZFoZIde/2GW
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
149KB
-
MD5
1a85fb803be48d4b605ebe3bfc4da62a
-
SHA1
2aa2b1a0313ea2b0f93a42c5c68a3dfc34f3be6f
-
SHA256
5b786fc82a774f220e3fc06b74a2f091d7aa30cdc84ed78851fdf1ea0932cb42
-
SHA512
2691bb8c2dd3b1612e38db8e1bb9ef73576b59af19ae6191f9741bc75f34361205ed684f1ce6151c0f9787f3dea22683444d32f6d47bc721e2a2dd000ccb65ca
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiWC23gO3EwUGPN:AbXE9OiTGfhEClq9F23gO0wUGl
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-