General
-
Target
864dbc273a1bccf6e980c120f0d64e125ffadb8b416d35d0af9689dc26083296
-
Size
99KB
-
Sample
221001-y6j2csfchk
-
MD5
72fb8c2461c03091c58f848ea057a380
-
SHA1
931db329730863fdab6382bcb4964d2a840261ae
-
SHA256
864dbc273a1bccf6e980c120f0d64e125ffadb8b416d35d0af9689dc26083296
-
SHA512
bd713d723d15a35ba9dd4a148ca7fd07e9c03610afef699a6178134def31fb84c432004cb550b1581f42e442b57ad77fec826e4c938327e7ceb2e91697d055ed
-
SSDEEP
3072:F47excGxFLPkH9SnbZDazo21mLtQqVI+8iXh:F+eGYtPk0Z+zo6JDiXh
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
149KB
-
MD5
e1fb70408c7945c6524c321063bd9570
-
SHA1
ebcd6a63fac9609c46e9c84708aa1e5701ee7775
-
SHA256
3e2da7a655e400f9e6ad442d4db21bac0a9528bc825aaaa8fdd97406458a59ed
-
SHA512
58751bd094dfc28c8b83085a480f70d1dfc97b990e69d90c4abe6ad5ec68c2a215445a664d5287bc624eab4175c2479fe6f0802b045fea61c12449af05f34814
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0higWrUzM/XP:AbXE9OiTGfhEClq9GWruyXP
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-