General
-
Target
1b8a3ce68b12d5075969da4513292d8ee84dea784194e998832bb62f4c875801
-
Size
99KB
-
Sample
220919-wrag9sfehk
-
MD5
105052eba80f77f217103814342dc59e
-
SHA1
8f09b64de2b8dd2cb1486bbc767df4e9442c4702
-
SHA256
1b8a3ce68b12d5075969da4513292d8ee84dea784194e998832bb62f4c875801
-
SHA512
c1553559c2af0ae2e3c357dab0203a579ddd02922a0797c782cde7d8fc95aafb199b162b2f0509f568f3700aa968ac28231c219f2a8853b1a99866fc9031b174
-
SSDEEP
3072:b47excGxFLPkH9SnbZDaWoN093t1pPXWH0:b+eGYtPk0Z+b29FPWH0
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-BABE.exe
-
Size
149KB
-
MD5
e9fd8bdc0bde7fcfe125365a38eea21b
-
SHA1
ef854a798f094d378dbcbb8fc9c6875dc6b9390b
-
SHA256
bcf7de87a7e8e1febba170298c2584377879146cb8f89d36f152c7ff96246f5f
-
SHA512
32f4993b48436d6ee6d5c0f427fe83bbca5df270804450326a74e518fa7f0b88b22a4ff06c32cf94bb1fa70709ded787a87ce10f6cef9f1a82c858427ba017a4
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHoaPXWH8:AbXE9OiTGfhEClq9aaPWH8
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-